default search action
27th ESORICS 2022: Copenhagen, Denmark - Part II
- Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1
Anonymity
- Isabel Wagner:
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. 3-23 - Bill Moriarty, Chun-Fu (Richard) Chen, Shaohan Hu, Sean Moran, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati:
Utility-Preserving Biometric Information Anonymization. 24-41 - Erin Kenney, Qiang Tang, Chase Wu:
Anonymous Traceback for End-to-End Encryption. 42-62
Cloud Security
- Willy Susilo, Yannan Li, Fuchun Guo, Jianchang Lai, Ge Wu:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. 65-85 - Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen, Willy Susilo, Kaitai Liang, Hai Jin:
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay. 86-104 - Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang:
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption. 105-125 - Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. 126-144 - Sunwoo Jang, Somin Song, Byungchul Tak, Sahil Suneja, Michael V. Le, Chuan Yue, Dan Williams:
SecQuant: Quantifying Container System Call Exposure. 145-166 - Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Robust and Scalable Process Isolation Against Spectre in the Cloud. 167-186
Access Control
- Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi S. Sandhu:
Administration of Machine Learning Based Access Control. 189-210 - François Hublet, David A. Basin, Srdan Krstic:
Real-Time Policy Enforcement with Metric First-Order Temporal Logic. 211-232 - Abdulla Aldoseri, David F. Oswald, Robert Chiper:
A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android Through App Components. 233-251
Authentication
- Bertram Poettering, Simon Rastikian:
Sequential Digital Signatures for Cryptographic Software-Update Authentication. 255-274 - John Chan, Phillip Rogaway:
On Committing Authenticated-Encryption. 275-294 - Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen:
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key. 295-316 - Alessia Michela Di Campi, Riccardo Focardi, Flaminia L. Luccio:
The Revenge of Password Crackers: Automated Training of Password Cracking Tools. 317-336 - Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Fuzzy Authenticated Key Exchange with Tight Security. 337-360 - Benjamin Dowling, Felix Günther, Alexandre Poirrier:
Continuous Authentication in Secure Messaging. 361-381
Digital Signatures
- Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. 385-404 - Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker:
Ring Signatures with User-Controlled Linkability. 405-426 - Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich:
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing. 427-446 - Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures from Lattices. 447-466 - Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Fritz Schmid, Dominique Schröder:
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero. 467-486 - Andreas Erwig, Siavash Riahi:
Deterministic Wallets for Adaptor Signatures. 487-506 - Mei Jiang, Dung Hoang Duong, Willy Susilo:
Puncturable Signature: A Generic Construction and Instantiations. 507-527
IoT Security
- Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu:
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. 531-548 - Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. 549-568 - Ruoyu Li, Qing Li, Yucheng Huang, Wenbin Zhang, Peican Zhu, Yong Jiang:
IoTEnsemble: Detection of Botnet Attacks on Internet of Things. 569-588 - Javaria Ahmad, Fengjun Li, Bo Luo:
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. 589-609 - Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. 610-628
Applications
- Véronique Cortier, Pierrick Gaudry, Quentin Yang:
A Toolbox for Verifiable Tally-Hiding E-Voting Systems. 631-652 - Henri Devillez, Olivier Pereira, Thomas Peters:
How to Verifiably Encrypt Many Bits for an Election? 653-671 - Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:
A Framework for Constructing Single Secret Leader Election from MPC. 672-691 - Darius Suciu, Radu Sion, Michael Ferdman:
AppBastion: Protection from Untrusted Apps and OSes on ARM. 692-715 - Jesus Cumplido, Cristina Alcaraz, Javier López:
Collaborative Anomaly Detection System for Charging Stations. 716-736
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.