default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2014
- Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves:
NORX: Parallel and Scalable AEAD. ESORICS (2) 2014: 19-36 - Raghavendran Balu, Teddy Furon, Sébastien Gambs:
Challenging Differential Privacy: The Case of Non-interactive Mechanisms. ESORICS (2) 2014: 146-164 - Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. ESORICS (2) 2014: 128-145 - Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Optimality and Complexity of Inference-Proof Data Filtering and CQE. ESORICS (2) 2014: 165-181 - Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial:
Privacy-Preserving Auditing for Attribute-Based Credentials. ESORICS (2) 2014: 109-127 - Tom Chothia, Yusuke Kawamoto, Chris Novakovic:
LeakWatch: Estimating Information Leakage from Java Programs. ESORICS (2) 2014: 219-236 - Véronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène:
Election Verifiability for Helios under Weaker Trust Assumptions. ESORICS (2) 2014: 327-344 - Christian Decker, Roger Wattenhofer:
Bitcoin Transaction Malleability and MtGox. ESORICS (2) 2014: 313-326 - Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian M. Molloy, Youngja Park:
Detecting Insider Information Theft Using Features from File Access Logs. ESORICS (2) 2014: 383-400 - Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au:
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption. ESORICS (2) 2014: 73-90 - Franziskus Kiefer, Mark Manulis:
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE. ESORICS (2) 2014: 295-312 - Jean-François Lalande, Karine Heydemann, Pascal Berthomé:
Software Countermeasures for Control Flow Integrity of Smart Card C Codes. ESORICS (2) 2014: 200-218 - Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited. ESORICS (2) 2014: 1-18 - Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, Yong Yu:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. ESORICS (2) 2014: 182-199 - Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yunya Zhou:
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS (2) 2014: 91-108 - Giorgia Azzurra Marson, Bertram Poettering:
Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. ESORICS (2) 2014: 37-54 - Byungho Min, Vijay Varadharajan:
Feature-Distributed Malware Attack: Risk and Defence. ESORICS (2) 2014: 457-474 - Shishir Nagaraja:
Botyacc: Unified P2P Botnet Detection Using Behavioural Analysis and Graph Analysis. ESORICS (2) 2014: 439-456 - Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin:
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS (2) 2014: 55-72 - Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate:
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. ESORICS (2) 2014: 345-364 - Jörg Schwenk:
Modelling Time for Authenticated Key Exchange Protocols. ESORICS (2) 2014: 277-294 - John Sonchack, Adam J. Aviv:
LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems. ESORICS (2) 2014: 365-382 - David I. Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin:
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification. ESORICS (2) 2014: 237-256 - Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu, Haopei Wang, Guofei Gu:
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. ESORICS (2) 2014: 401-418 - Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou:
Click Fraud Detection on the Advertiser Side. ESORICS (2) 2014: 419-438 - Xun Yi, Feng Hao, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. ESORICS (2) 2014: 257-276 - Lingchen Zhang, Sachin Shetty, Peng Liu, Jiwu Jing:
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. ESORICS (2) 2014: 475-493 - Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Lecture Notes in Computer Science 8713, Springer 2014, ISBN 978-3-319-11211-4 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-02 15:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint