Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
47
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,560
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Computer Security – ESORICS 2016
other
Editor(s):
Ioannis Askoxylakis
,
Sotiris Ioannidis
,
Sokratis Katsikas
,
Catherine Meadows
Publication date
(Print):
2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Author and book information
Book
ISBN (Print):
978-3-319-45743-7
ISBN (Electronic):
978-3-319-45744-4
Publication date (Print):
2016
DOI:
10.1007/978-3-319-45744-4
SO-VID:
f44a798a-ecc9-4a85-9218-f33bb3de8f38
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
pp. 27
Toward an Efficient Website Fingerprinting Defense
pp. 47
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
pp. 69
Comparing Password Ranking Algorithms on Real-World Password Datasets
pp. 91
Scalable Two-Factor Authentication Using Historical Data
pp. 111
On the Implications of Zipf’s Law in Passwords
pp. 135
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
pp. 154
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
pp. 173
Efficient Encrypted Keyword Search for Multi-user Data Sharing
pp. 199
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
pp. 217
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
pp. 238
A Machine Learning Approach for Detecting Third-Party Trackers on the Web
pp. 261
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
pp. 279
Attribute-Based Signatures for Supporting Anonymous Certification
pp. 301
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes
pp. 324
Lightweight Delegatable Proofs of Storage
pp. 344
Anonymous RAM
pp. 363
Efficient Sanitizable Signatures Without Random Oracles
pp. 383
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook
pp. 401
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images
pp. 422
NaClDroid: Native Code Isolation for Android Applications
pp. 440
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
pp. 458
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
pp. 477
Android Permission Recommendation Using Transitive Bayesian Inference Model
pp. 501
Spot the Difference: Secure Multi-execution and Multiple Facets
pp. 520
On Reductions from Multi-Domain Noninterference to the Two-Level Case
pp. 538
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries
pp. 561
Let’s Face It: Faceted Values for Taint Tracking
pp. 581
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming
pp. 602
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets
Similar content
1,560
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings
Authors:
Joaquin Garcia-Alfaro
,
Guillermo Navarro-Arribas
,
Hannes Hartenstein
…
ESORICS 94
Authors:
AW Roscoe
,
A. Roscoe
,
A. W. Roscoe
Computer Security – ESORICS 2019
Authors:
See all similar
Cited by
2
Fidelius: Protecting User Secrets from Compromised Browsers
Authors:
Jonathan Cogan
,
Saba Eskandarian
,
Dillon Franke
…
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers
Authors:
Bharat Srinivasan
,
Najmeh Miramirkhani
,
Nick Nikiforakis
…
See all cited by