


default search action
18. ESORICS 2013: Egham, UK - DPM/SETOP
- Joaquín García-Alfaro
, Georgios V. Lioudakis
, Nora Cuppens-Boulahia, Simon N. Foley
, William M. Fitzgerald:
Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8247, Springer 2014, ISBN 978-3-642-54567-2
Keynote Address
- Steven J. Murdoch:
Quantifying and Measuring Anonymity. 3-13
Data Privacy Management
- Jan Hajny, Lukas Malina
, Zdenek Martinasek
, Ondrej Tethal:
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones. 17-33 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
:
Practical Packing Method in Somewhat Homomorphic Encryption. 34-50 - Nelson Gonçalves, Rui José
, Carlos Baquero
:
Collaborative and Privacy-Aware Sensing for Observing Urban Movement Patterns. 51-65 - Mauro Barni, Massimo Bernaschi, Riccardo Lazzeretti, Tommaso Pignata, Alessandro Sabellico:
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting. 66-82 - Florian Kammüller, Sören Preibusch:
Privacy Analysis of a Hidden Friendship Protocol. 83-99 - Arnau Vives-Guasch, Magdalena Payeras-Capellà
, Macià Mut Puigserver, Jordi Castellà-Roca
, Josep Lluís Ferrer-Gomila
:
Anonymous and Transferable Electronic Ticketing Scheme. 100-113 - Giovanni Di Crescenzo, Brian A. Coan, John L. Schultz, Simon Tsang, Rebecca N. Wright:
Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model. 114-132 - Erman Ayday, Jean Louis Raisaro
, Urs Hengartner, Adam Molyneaux, Jean-Pierre Hubaux:
Privacy-Preserving Processing of Raw Genomic Data. 133-147 - Arnau Erola, Jordi Castellà-Roca
:
Using Search Results to Microaggregate Query Logs Semantically. 148-161 - Manuel Munier, Vincent Lalanne, Pierre-Yves Ardoy, Magali Ricarde:
Legal Issues About Metadata Data Privacy vs Information Security. 162-177 - Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model. 178-193 - Michael Backes, Sebastian Meiser:
Differentially Private Smart Metering with Battery Recharging. 194-212 - Michael Backes, Sebastian Gerling, Christian Hammer
, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. 213-231
Autonomous and Spontaneous Security
- Ronan-Alexandre Cherrueau, Rémi Douence, Jean-Claude Royer, Mario Südholt, Anderson Santana de Oliveira, Yves Roudier, Matteo Dell'Amico
:
Reference Monitors for Security and Interoperability in OAuth 2.0. 235-249 - Mads I. Ingwar, Christian Damsgaard Jensen
:
Remote Biometrics for Robust Persistent Authentication. 250-267 - Fabio Martinelli, Andrea Saracino
, Daniele Sgandurra:
Classifying Android Malware through Subgraph Mining. 268-283 - Gianluca Dini, Fabio Martinelli, Ilaria Matteucci
, Andrea Saracino
, Daniele Sgandurra:
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security. 284-299 - Quentin Jérome, Samuel Marchal
, Radu State, Thomas Engel:
Advanced Detection Tool for PDF Threats. 300-315 - Gabriel Serme, Theodoor Scholte, Anderson Santana de Oliveira:
Enforcing Input Validation through Aspect Oriented Programming. 316-332 - Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos:
Lightweight Cryptography for Embedded Systems - A Comparative Analysis. 333-349
Short Papers
- Michael Oehler, Dhananjay S. Phatak:
A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching. 353-361 - Meilof Veeningen, Antonio Piepoli, Nicola Zannone
:
Are On-Line Personae Really Unlinkable? 369-379 - Kiavash Satvat, Matthew Forshaw
, Feng Hao
, Ehsan Toreini
:
On the Privacy of Private Browsing - A Forensic Approach. 380-389 - Oriol Farràs
, Josep Domingo-Ferrer
, Alberto Blanco-Justicia
:
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes. 390-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.