researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1990
1992
1994
1996
1998
2000
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
[+]
OR
AND
NOT
1
C++
Java
Meta-Environment
access control
analysis
architecture
control systems
data-flow
database
e-science
meta-model
meta-objects
mobile
open-source
protocol
role-based access control
rule-based
security
source-to-source
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Ahmad-Reza Sadeghi
Andrei Sabelfeld
David A. Basin
Elisa Bertino
Frédéric Cuppens
Gene Tsudik
Jianying Zhou
Joseph K. Liu
Mauro Conti
Michael Backes
Ninghui Li
Nora Cuppens-Boulahia
Pierangela Samarati
Robert H. Deng
Sushil Jajodia
Thorsten Holz
Vicenç Torra
Wenjing Lou
Willy Susilo
Xiaofeng Chen 0001
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
attacks
authentication
control
data
detection
efficient
encryption
information
key
model
networks
preserving
privacy
secure
security
systems
towards
using
ESORICS (esorics)
Editions
Publications
Viewing Publication 1 - 100 from 1957
2024
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I
Sokratis K. Katsikas
,
Frédéric Cuppens
,
Nora Cuppens-Boulahia
,
Costas Lambrinoudakis
,
Joaquín García-Alfaro
,
Guillermo Navarro-Arribas
,
Pantaleone Nespoli
,
Christos Kalloniatis
,
John Mylopoulos
,
Annie I. Antón
,
Stefanos Gritzalis
, editors,
Volume 14398 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14344 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14347 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14346 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14345 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
2023
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
Lukas Gerlach 0001
,
Fabian Thomas
,
Robert Pietsch
,
Michael Schwarz 0001
.
esorics 2024
:
62-79
[doi]
Tactics for Account Access Graphs
Luca Arnaboldi 0001
,
David Aspinall 0001
,
Christina Kolb
,
Sasa Radomirovic
.
esorics 2024
:
452-470
[doi]
An Empirical Study of the Imbalance Issue in Software Vulnerability Detection
Yuejun Guo 0001
,
Qiang Hu
,
Qiang Tang 0001
,
Yves Le Traon
.
esorics 2024
:
371-390
[doi]
Reviving Meltdown 3a
Daniel Weber 0007
,
Fabian Thomas
,
Lukas Gerlach 0001
,
Ruiyi Zhang
,
Michael Schwarz 0001
.
esorics 2024
:
80-99
[doi]
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
Daniel Weber 0007
,
Fabian Thomas
,
Lukas Gerlach 0001
,
Ruiyi Zhang
,
Michael Schwarz 0001
.
esorics 2024
:
22-42
[doi]
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
Feng Li 0041
,
Jianfeng Ma 0001
,
Yinbin Miao
,
Pengfei Wu
,
Xiangfu Song
.
esorics 2024
:
126-146
[doi]
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Aysajan Abidin
,
Erik Pohle
,
Bart Preneel
.
esorics 2024
:
86-105
[doi]
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain
Tae Min Ahn
,
Kang Hoon Lee
,
Joon Soo Yoo
,
Ji Won Yoon
.
esorics 2024
:
334-352
[doi]
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth
Yavuz Akin
,
Jakub Klemsa
,
Melek Önen
.
esorics 2024
:
3-23
[doi]
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions
Muaz Ali
,
Muhammad Muzammil
,
Faraz Karim
,
Ayesha Naeem
,
Rukhshan Haroon
,
Muhammad Haris
,
Huzaifah Nadeem
,
Waseem Sabir
,
Fahad Shaon
,
Fareed Zaffar
,
Vinod Yegneswaran
,
Ashish Gehani
,
Sazzadur Rahaman
.
esorics 2024
:
229-249
[doi]
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation
Ravi Anand
,
Subhadeep Banik
,
Andrea Caforio
,
Kazuhide Fukushima
,
Takanori Isobe 0001
,
Shinsaku Kiyomoto
,
Fukang Liu
,
Yuto Nakano
,
Kosei Sakamoto
,
Nobuyuki Takeuchi
.
esorics 2024
:
229-248
[doi]
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks
Radu Anghel
,
Swaathi Vetrivel
,
Elsa Turcios Rodriguez
,
Kaichi Sameshima
,
Daisuke Makita
,
Katsunari Yoshioka
,
Carlos Gañán
,
Yury Zhauniarovich
.
esorics 2024
:
23-41
[doi]
Towards a Privacy-Preserving Attestation for Virtualized Networks
Ghada Arfaoui
,
Thibaut Jacques
,
Marc Lacoste
,
Cristina Onete
,
Léo Robert
.
esorics 2024
:
351-370
[doi]
AddShare: A Privacy-Preserving Approach for Federated Learning
Bernard Asare
,
Paula Branco
,
Iluju Kiringa
,
Tet Hin Yeap
.
esorics 2024
:
299-309
[doi]
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments
Massimiliano Baldo
,
Tommaso Bianchi
,
Mauro Conti
,
Alessio Trevisan
,
Federico Turrin
.
esorics 2024
:
145-159
[doi]
Layered Symbolic Security Analysis in $\textsf {DY}^\star $
Karthikeyan Bhargavan
,
Abhishek Bichhawat
,
Pedram Hosseyni
,
Ralf Küsters
,
Klaas Pruiksma
,
Guido Schmitz
,
Clara Waldmann
,
Tim Würtele
.
esorics 2024
:
3-21
[doi]
Fingerprinting of Cellular Infrastructure Based on Broadcast Information
Anup Kiran Bhattacharjee
,
Stefano Cecconello
,
Fernando Kuipers
,
Georgios Smaragdakis
.
esorics 2024
:
81-101
[doi]
Sequential Half-Aggregation of Lattice-Based Signatures
Katharina Boudgoust
,
Akira Takahashi 0002
.
esorics 2024
:
270-289
[doi]
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations
Xavier Boyen
,
Qinyi Li
.
esorics 2024
:
425-445
[doi]
ResolFuzz: Differential Fuzzing of DNS Resolvers
Jonas Bushart
,
Christian Rossow
.
esorics 2024
:
62-80
[doi]
PrivMail: A Privacy-Preserving Framework for Secure Emails
Gowri R. Chandran
,
Raine Nieminen
,
Thomas Schneider 0003
,
Ajith Suresh
.
esorics 2024
:
145-165
[doi]
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices
Zhe Chen
,
Haiqing Qiu
,
Xuhua Ding
.
esorics 2024
:
271-289
[doi]
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce
Michal Choras
,
Aleksandra Pawlicka
,
Dagmara Jaroszewska-Choras
,
Marek Pawlicki
.
esorics 2024
:
167-181
[doi]
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks
Tristan Claverie
,
Gildas Avoine
,
Stéphanie Delaune
,
José Lopes-Esteves
.
esorics 2024
:
100-119
[doi]
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition
Amit Cohen
,
Mahmood Sharif
.
esorics 2024
:
43-61
[doi]
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
Ofir Cohen
,
Ron Bitton
,
Asaf Shabtai
,
Rami Puzis
.
esorics 2024
:
431-451
[doi]
Panini - Anonymous Anycast and an Instantiation
Christoph Coijanovic
,
Christiane Weis
,
Thorsten Strufe
.
esorics 2024
:
193-211
[doi]
A Simple Single Slot Finality Protocol for Ethereum
Francesco D'Amato
,
Luca Zanolini
.
esorics 2024
:
376-393
[doi]
PrivacySmart: Automatic and Transparent Management of Privacy Policies
Cristòfol Daudén-Esmel
,
Jordi Castellà-Roca
,
Alexandre Viejo
,
Eduard Josep Bel-Ribes
.
esorics 2024
:
216-231
[doi]
Password-Based Credentials with Security Against Server Compromise
Dennis Dayanikli
,
Anja Lehmann
.
esorics 2024
:
147-167
[doi]
μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems
Luca Degani
,
Majid Salehi
,
Fabio Martinelli
,
Bruno Crispo
.
esorics 2024
:
311-331
[doi]
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame
Constantin Catalin Dragan
,
François Dupressoir
,
Kristian Gjøsteen
,
Thomas Haines
,
Peter B. Rønne
,
Morten Rotvold Solberg
.
esorics 2024
:
471-491
[doi]
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy
Cihan Eryonucu
,
Panos Papadimitratos
.
esorics 2024
:
474-493
[doi]
Protocol Dialects as Formal Patterns
D. Galán
,
Víctor García
,
Santiago Escobar 0001
,
Catherine A. Meadows
,
José Meseguer 0001
.
esorics 2024
:
42-61
[doi]
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers
Joaquin Garcia-Alfaro
,
Guillermo Navarro-Arribas
,
Nicola Dragoni
, editors,
Volume 13619 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
On the Usage of NLP on CVE Descriptions for Calculating Risk
Thrasyvoulos Giannakopoulos
,
Konstantinos N. Maliatsos
.
esorics 2024
:
104-123
[doi]
Traffic Analysis by Adversaries with Partial Visibility
Iness Ben Guirat
,
Claudia Díaz
,
Karim Eldefrawy
,
Hadas Zeilberger
.
esorics 2024
:
338-358
[doi]
Learning Markov Chain Models from Sequential Data Under Local Differential Privacy
Efehan Guner
,
Mehmet Emre Gursoy
.
esorics 2024
:
359-379
[doi]
Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach
Sargam Gupta
,
Vicenç Torra
.
esorics 2024
:
260-271
[doi]
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data
Florent Guépin
,
Matthieu Meeus
,
Ana-Maria Cretu 0002
,
Yves-Alexandre de Montjoye
.
esorics 2024
:
182-198
[doi]
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
Florian Helmschmidt
,
Pedram Hosseyni
,
Ralf Küsters
,
Klaas Pruiksma
,
Clara Waldmann
,
Tim Würtele
.
esorics 2024
:
222-242
[doi]
Scaling Mobile Private Contact Discovery to Billions of Users
Laura Hetz
,
Thomas Schneider 0003
,
Christian Weinert
.
esorics 2024
:
455-476
[doi]
Enforcing the GDPR
François Hublet
,
David A. Basin
,
Srdan Krstic
.
esorics 2024
:
400-422
[doi]
Machine Learning for SAST: A Lightweight and Adaptable Approach
Lorenz Hüther
,
Karsten Sohr
,
Bernhard J. Berger
,
Hendrik Rothe
,
Stefan Edelkamp
.
esorics 2024
:
85-104
[doi]
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges
Michela Iezzi
,
Carsten Maple
,
Andrea Leonetti
.
esorics 2024
:
283-298
[doi]
Chaussette: A Symbolic Verification of Bitcoin Scripts
Vincent Jacquot
,
Benoit Donnet
.
esorics 2024
:
359-375
[doi]
Practical Randomized Lattice Gadget Decomposition with Application to FHE
Sohyun Jeon
,
Hyang-Sook Lee
,
Jeongeun Park 0001
.
esorics 2024
:
353-371
[doi]
Everlasting ROBOT: The Marvin Attack
Hubert Kario
.
esorics 2024
:
243-262
[doi]
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack
Sowoong Kim
,
Myeonggyun Han
,
Woongki Baek
.
esorics 2024
:
120-140
[doi]
Efficient Transparent Polynomial Commitments for zk-SNARKs
Sungwook Kim
,
Sungju Kim
,
Yulim Shin
,
Sunmi Kim
,
Jihye Kim
,
Hyunok Oh
.
esorics 2024
:
348-366
[doi]
Overview of Social Engineering Protection and Prevention Methods
Konstantinos Kontogeorgopoulos
,
Kyriakos Kritikos
.
esorics 2024
:
64-83
[doi]
Security of NVMe Offloaded Data in Large-Scale Machine Learning
Torsten Krauß
,
Raphael Götz
,
Alexandra Dmitrienko
.
esorics 2024
:
143-163
[doi]
Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements
Selasi Kwashie
,
Wei Kang 0004
,
Sandeep Santhosh Kumar
,
Geoff Jarrad
,
Seyit Camtepe
,
Surya Nepal
.
esorics 2024
:
410-430
[doi]
Integrally Private Model Selection for Support Vector Machine
Saloni Kwatra
,
Ayush K. Varshney
,
Vicenç Torra
.
esorics 2024
:
249-259
[doi]
Evaluation of an OPC UA-Based Access Control Enforcement Architecture
Björn Leander
,
Aida Causevic
,
Hans Hansson
,
Tomas Lindström
.
esorics 2024
:
124-144
[doi]
FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models
YoungHan Lee
,
Yungi Cho
,
Woorim Han
,
Ho Bae
,
Yunheung Paek
.
esorics 2024
:
65-84
[doi]
Creating Privacy Policies from Data-Flow Diagrams
Jens Leicht
,
Marvin Wagner
,
Maritta Heisel
.
esorics 2024
:
433-453
[doi]
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
Shaoyu Li
,
Shanghao Shi
,
Yang Xiao 0010
,
Chaoyu Zhang
,
Y. Thomas Hou 0001
,
Wenjing Lou
.
esorics 2024
:
306-326
[doi]
FSmell: Recognizing Inline Function in Binary Code
Wei Lin
,
Qingli Guo
,
Jiawei Yin
,
Xiangyu Zuo
,
Rongqing Wang
,
Xiaorui Gong
.
esorics 2024
:
487-506
[doi]
LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing
Wenqing Liu
,
An-I Andy Wang
.
esorics 2024
:
507-525
[doi]
When is Slower Block Propagation More Profitable for Large Miners?
Zhichun Lu
,
Ren Zhang
.
esorics 2024
:
285-305
[doi]
Two-Message Authenticated Key Exchange from Public-Key Encryption
You Lyu
,
Shengli Liu 0001
.
esorics 2024
:
414-434
[doi]
Optimally-Fair Multi-party Exchange Without Trusted Parties
Ivo Maffei
,
A. W. Roscoe 0001
.
esorics 2024
:
313-333
[doi]
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
Jules Maire
,
Damien Vergnaud
.
esorics 2024
:
189-208
[doi]
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
Jules Maire
,
Damien Vergnaud
.
esorics 2024
:
435-454
[doi]
Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing
Matthieu Meeus
,
Florent Guépin
,
Ana-Maria Cretu 0002
,
Yves-Alexandre de Montjoye
.
esorics 2024
:
380-399
[doi]
Syntax-Aware Mutation for Testing the Solidity Compiler
Charalambos Mitropoulos
,
Thodoris Sotiropoulos
,
Sotiris Ioannidis
,
Dimitris Mitropoulos
.
esorics 2024
:
327-347
[doi]
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications
Mohammad Sadegh Nourbakhsh
,
Feng Hao 0001
,
Arshad Jhumka
.
esorics 2024
:
327-343
[doi]
Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems
Ivan De Oliveira Nunes
,
Peter Rindal
,
Maliheh Shirvanian
.
esorics 2024
:
290-312
[doi]
A New Model for Testing IPv6 Fragment Handling
Edoardo Di Paolo
,
Enrico Bassetti
,
Angelo Spognardi
.
esorics 2024
:
277-294
[doi]
Timely Identification of Victim Addresses in DeFi Attacks
Bahareh Parhizkari
,
Antonio Ken Iannillo
,
Christof Ferreira Torres
,
Sebastian Banescu
,
Joseph Jiaqi Xu
,
Radu State
.
esorics 2024
:
394-410
[doi]
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models
Bipin Paudel
,
George T. Amariucai
.
esorics 2024
:
3-22
[doi]
stoRNA: Stateless Transparent Proofs of Storage-time
Reyhaneh Rabaninejad
,
Behzad Abdolmaleki
,
Giulio Malavolta
,
Antonis Michalas
,
Amir Nabizadeh
.
esorics 2024
:
389-410
[doi]
Up-to-Date Threat Modelling for Soft Privacy on Smart Cars
Mario Raciti
,
Giampaolo Bella
.
esorics 2024
:
454-473
[doi]
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps
Abdelrahman Ragab
,
Mohammad Mannan
,
Amr M. Youssef
.
esorics 2024
:
232-248
[doi]
PassGPT: Password Modeling and (Guided) Generation with Large Language Models
Javier Rando
,
Fernando Pérez-Cruz
,
Briland Hitaj
.
esorics 2024
:
164-183
[doi]
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning
Maria Rigaki
,
Sebastian García
.
esorics 2024
:
44-64
[doi]
Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption
Bruno Rodrigues
,
Ivone Amorim
,
Ivan Silva
,
Alexandra Mendes
.
esorics 2024
:
199-215
[doi]
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain
Susanne Barkhald Sandberg
,
Aida Akbarzadeh
,
Vasileios Gkioulos
.
esorics 2024
:
5-24
[doi]
Learning Type Inference for Enhanced Dataflow Analysis
Lukas Seidel
,
Sedick David Baker Effendi
,
Xavier Pinho
,
Konrad Rieck
,
Brink van der Merwe
,
Fabian Yamaguchi
.
esorics 2024
:
184-203
[doi]
Review on Privacy and Trust Methodologies in Cloud Computing
Stavros Simou
,
Aikaterini-Georgia Mavroeidi
,
Christos Kalloniatis
.
esorics 2024
:
494-505
[doi]
Skade - A Challenge Management System for Cyber Threat Hunting
Teodor Sommestad
,
Henrik Karlzén
,
Hanna Kvist
,
Hanna Gustafsson
.
esorics 2024
:
84-103
[doi]
Threshold Fully Homomorphic Encryption Over the Torus
Yukimasa Sugizaki
,
Hikaru Tsuchida
,
Takuya Hayashi
,
Koji Nuida
,
Akira Nakashima
,
Toshiyuki Isshiki
,
Kengo Mori
.
esorics 2024
:
45-65
[doi]
Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word Prediction
Mohamed Suliman
,
Douglas J. Leith
.
esorics 2024
:
105-122
[doi]
AttnCall: Refining Indirect Call Targets in Binaries with Attention
Rui Sun
,
Yinggang Guo
,
ZiCheng Wang
,
Qingkai Zeng 0002
.
esorics 2024
:
391-409
[doi]
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Marcel Tiepelt
,
Edward Eaton
,
Douglas Stebila
.
esorics 2024
:
168-188
[doi]
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis
Heitor Uchoa
,
Vipul Arora
,
Dennis Vermoen
,
Marco Ottavi
,
Nikolaos Alachiotis 0001
.
esorics 2024
:
203-221
[doi]
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers
Vik Vanderlinden
,
Tom van Goethem
,
Mathy Vanhoef
.
esorics 2024
:
3-22
[doi]
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Carmen Wabartha
,
Julian Liedtke
,
Nicolas Huber
,
Daniel Rausch 0001
,
Ralf Küsters
.
esorics 2024
:
209-228
[doi]
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi
Jianhuan Wang
,
Jichen Li
,
Zecheng Li
,
Xiaotie Deng
,
Bin Xiao
.
esorics 2024
:
367-386
[doi]
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection
Yifan Xia
,
Ping He
,
Xuhong Zhang 0002
,
Peiyu Liu 0003
,
Shouling Ji
,
Wenhai Wang
.
esorics 2024
:
255-276
[doi]
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications
Bowen Xu
,
Shijie Jia 0001
,
Jingqiang Lin
,
Fangyu Zheng
,
Yuan Ma
,
Limin Liu
,
Xiaozhuo Gu
,
Li Song
.
esorics 2024
:
263-282
[doi]
Privacy-Preserving Split Learning via Pareto Optimal Search
Xi Yu
,
Liyao Xiang
,
Shiming Wang
,
Chengnian Long
.
esorics 2024
:
123-142
[doi]
Aion: Secure Transaction Ordering Using TEEs
Pouriya Zarbafian
,
Vincent Gramoli
.
esorics 2024
:
332-350
[doi]
Secure Multiparty Sampling of a Biased Coin for Differential Privacy
Amir Zarei
,
Staal Amund Vinterbo
.
esorics 2024
:
310-320
[doi]
Sign in
or
sign up
to see more results.