researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1990
1992
1994
1996
1998
2000
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
[+]
OR
AND
NOT
1
C++
Java
Meta-Environment
access control
analysis
architecture
control systems
data-flow
database
e-science
meta-model
meta-objects
mobile
open-source
protocol
role-based access control
rule-based
security
source-to-source
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Ahmad-Reza Sadeghi
Andrei Sabelfeld
David A. Basin
Elisa Bertino
Frédéric Cuppens
Gene Tsudik
Jianying Zhou
Joseph K. Liu
Mauro Conti
Michael Backes
Ninghui Li
Nora Cuppens-Boulahia
Pierangela Samarati
Robert H. Deng
Sushil Jajodia
Thorsten Holz
Vicenç Torra
Wenjing Lou
Willy Susilo
Xiaofeng Chen 0001
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
attacks
authentication
control
data
detection
efficient
encryption
information
key
model
networks
preserving
privacy
secure
security
systems
towards
using
ESORICS (esorics)
Editions
Publications
Viewing Publication 1 - 100 from 1957
2024
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I
Sokratis K. Katsikas
,
Frédéric Cuppens
,
Nora Cuppens-Boulahia
,
Costas Lambrinoudakis
,
Joaquín García-Alfaro
,
Guillermo Navarro-Arribas
,
Pantaleone Nespoli
,
Christos Kalloniatis
,
John Mylopoulos
,
Annie I. Antón
,
Stefanos Gritzalis
, editors,
Volume 14398 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14346 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14344 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14347 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II
Gene Tsudik
,
Mauro Conti
,
Kaitai Liang
,
Georgios Smaragdakis
, editors,
Volume 14345 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
2023
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
Lukas Gerlach 0001
,
Fabian Thomas
,
Robert Pietsch
,
Michael Schwarz 0001
.
esorics 2024
:
62-79
[doi]
Tactics for Account Access Graphs
Luca Arnaboldi 0001
,
David Aspinall 0001
,
Christina Kolb
,
Sasa Radomirovic
.
esorics 2024
:
452-470
[doi]
Trajectory Hiding and Sharing for Supply Chains with Differential Privacy
Tianyu Li 0002
,
Li Xu
,
Zekeriya Erkin
,
Reginald L. Lagendijk
.
esorics 2024
:
297-317
[doi]
Reviving Meltdown 3a
Daniel Weber 0007
,
Fabian Thomas
,
Lukas Gerlach 0001
,
Ruiyi Zhang
,
Michael Schwarz 0001
.
esorics 2024
:
80-99
[doi]
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
Daniel Weber 0007
,
Fabian Thomas
,
Lukas Gerlach 0001
,
Ruiyi Zhang
,
Michael Schwarz 0001
.
esorics 2024
:
22-42
[doi]
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
Feng Li 0041
,
Jianfeng Ma 0001
,
Yinbin Miao
,
Pengfei Wu
,
Xiangfu Song
.
esorics 2024
:
126-146
[doi]
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Aysajan Abidin
,
Erik Pohle
,
Bart Preneel
.
esorics 2024
:
86-105
[doi]
Efficient Pruning for Machine Learning Under Homomorphic Encryption
Ehud Aharoni
,
Moran Baruch
,
Pradip Bose
,
Alper Buyuktosunoglu
,
Nir Drucker
,
Subhankar Pal
,
Tomer Pelleg
,
Kanthi K. Sarpatwar
,
Hayim Shaul
,
Omri Soceanu
,
Roman Vaculín
.
esorics 2024
:
204-225
[doi]
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain
Tae Min Ahn
,
Kang Hoon Lee
,
Joon Soo Yoo
,
Ji Won Yoon
.
esorics 2024
:
334-352
[doi]
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth
Yavuz Akin
,
Jakub Klemsa
,
Melek Önen
.
esorics 2024
:
3-23
[doi]
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions
Muaz Ali
,
Muhammad Muzammil
,
Faraz Karim
,
Ayesha Naeem
,
Rukhshan Haroon
,
Muhammad Haris
,
Huzaifah Nadeem
,
Waseem Sabir
,
Fahad Shaon
,
Fareed Zaffar
,
Vinod Yegneswaran
,
Ashish Gehani
,
Sazzadur Rahaman
.
esorics 2024
:
229-249
[doi]
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation
Ravi Anand
,
Subhadeep Banik
,
Andrea Caforio
,
Kazuhide Fukushima
,
Takanori Isobe 0001
,
Shinsaku Kiyomoto
,
Fukang Liu
,
Yuto Nakano
,
Kosei Sakamoto
,
Nobuyuki Takeuchi
.
esorics 2024
:
229-248
[doi]
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks
Radu Anghel
,
Swaathi Vetrivel
,
Elsa Turcios Rodriguez
,
Kaichi Sameshima
,
Daisuke Makita
,
Katsunari Yoshioka
,
Carlos Gañán
,
Yury Zhauniarovich
.
esorics 2024
:
23-41
[doi]
Towards a Privacy-Preserving Attestation for Virtualized Networks
Ghada Arfaoui
,
Thibaut Jacques
,
Marc Lacoste
,
Cristina Onete
,
Léo Robert
.
esorics 2024
:
351-370
[doi]
AddShare: A Privacy-Preserving Approach for Federated Learning
Bernard Asare
,
Paula Branco
,
Iluju Kiringa
,
Tet Hin Yeap
.
esorics 2024
:
299-309
[doi]
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
Lennart Bader
,
Eric Wagner 0003
,
Martin Henze
,
Martin Serror
.
esorics 2024
:
25-45
[doi]
Layered Symbolic Security Analysis in $\textsf {DY}^\star $
Karthikeyan Bhargavan
,
Abhishek Bichhawat
,
Pedram Hosseyni
,
Ralf Küsters
,
Klaas Pruiksma
,
Guido Schmitz
,
Clara Waldmann
,
Tim Würtele
.
esorics 2024
:
3-21
[doi]
Fingerprinting of Cellular Infrastructure Based on Broadcast Information
Anup Kiran Bhattacharjee
,
Stefano Cecconello
,
Fernando Kuipers
,
Georgios Smaragdakis
.
esorics 2024
:
81-101
[doi]
Malware Classification Using Open Set Recognition and HTTP Protocol Requests
Piotr Bialczak
,
Wojciech Mazurczyk
.
esorics 2024
:
235-254
[doi]
Sequential Half-Aggregation of Lattice-Based Signatures
Katharina Boudgoust
,
Akira Takahashi 0002
.
esorics 2024
:
270-289
[doi]
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations
Xavier Boyen
,
Qinyi Li
.
esorics 2024
:
425-445
[doi]
s-Anonymization for Smart Meter Data
Carolin Brunn
,
Saskia Nuñez von Voigt
,
Florian Tschorsch
.
esorics 2024
:
272-282
[doi]
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
Théophile Brézot
,
Paola de Perthuis
,
David Pointcheval
.
esorics 2024
:
372-392
[doi]
ResolFuzz: Differential Fuzzing of DNS Resolvers
Jonas Bushart
,
Christian Rossow
.
esorics 2024
:
62-80
[doi]
Committed Private Information Retrieval
Quang Cao
,
Hong-Yen Tran
,
Son Hoang Dau
,
Xun Yi
,
Emanuele Viterbo
,
Chen Feng 0001
,
Yu-Chih Huang
,
Jingge Zhu
,
Stanislav Kruglik
,
Han Mao Kiah
.
esorics 2024
:
393-413
[doi]
PrivMail: A Privacy-Preserving Framework for Secure Emails
Gowri R. Chandran
,
Raine Nieminen
,
Thomas Schneider 0003
,
Ajith Suresh
.
esorics 2024
:
145-165
[doi]
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices
Zhe Chen
,
Haiqing Qiu
,
Xuhua Ding
.
esorics 2024
:
271-289
[doi]
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce
Michal Choras
,
Aleksandra Pawlicka
,
Dagmara Jaroszewska-Choras
,
Marek Pawlicki
.
esorics 2024
:
167-181
[doi]
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks
Tristan Claverie
,
Gildas Avoine
,
Stéphanie Delaune
,
José Lopes-Esteves
.
esorics 2024
:
100-119
[doi]
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition
Amit Cohen
,
Mahmood Sharif
.
esorics 2024
:
43-61
[doi]
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
Ofir Cohen
,
Ron Bitton
,
Asaf Shabtai
,
Rami Puzis
.
esorics 2024
:
431-451
[doi]
Panini - Anonymous Anycast and an Instantiation
Christoph Coijanovic
,
Christiane Weis
,
Thorsten Strufe
.
esorics 2024
:
193-211
[doi]
A Simple Single Slot Finality Protocol for Ethereum
Francesco D'Amato
,
Luca Zanolini
.
esorics 2024
:
376-393
[doi]
PrivacySmart: Automatic and Transparent Management of Privacy Policies
Cristòfol Daudén-Esmel
,
Jordi Castellà-Roca
,
Alexandre Viejo
,
Eduard Josep Bel-Ribes
.
esorics 2024
:
216-231
[doi]
Password-Based Credentials with Security Against Server Compromise
Dennis Dayanikli
,
Anja Lehmann
.
esorics 2024
:
147-167
[doi]
μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems
Luca Degani
,
Majid Salehi
,
Fabio Martinelli
,
Bruno Crispo
.
esorics 2024
:
311-331
[doi]
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame
Constantin Catalin Dragan
,
François Dupressoir
,
Kristian Gjøsteen
,
Thomas Haines
,
Peter B. Rønne
,
Morten Rotvold Solberg
.
esorics 2024
:
471-491
[doi]
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy
Cihan Eryonucu
,
Panos Papadimitratos
.
esorics 2024
:
474-493
[doi]
Protocol Dialects as Formal Patterns
D. Galán
,
Víctor García
,
Santiago Escobar 0001
,
Catherine A. Meadows
,
José Meseguer 0001
.
esorics 2024
:
42-61
[doi]
On the Usage of NLP on CVE Descriptions for Calculating Risk
Thrasyvoulos Giannakopoulos
,
Konstantinos N. Maliatsos
.
esorics 2024
:
104-123
[doi]
Traffic Analysis by Adversaries with Partial Visibility
Iness Ben Guirat
,
Claudia Díaz
,
Karim Eldefrawy
,
Hadas Zeilberger
.
esorics 2024
:
338-358
[doi]
Learning Markov Chain Models from Sequential Data Under Local Differential Privacy
Efehan Guner
,
Mehmet Emre Gursoy
.
esorics 2024
:
359-379
[doi]
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data
Florent Guépin
,
Matthieu Meeus
,
Ana-Maria Cretu 0002
,
Yves-Alexandre de Montjoye
.
esorics 2024
:
182-198
[doi]
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
Florian Helmschmidt
,
Pedram Hosseyni
,
Ralf Küsters
,
Klaas Pruiksma
,
Clara Waldmann
,
Tim Würtele
.
esorics 2024
:
222-242
[doi]
Scaling Mobile Private Contact Discovery to Billions of Users
Laura Hetz
,
Thomas Schneider 0003
,
Christian Weinert
.
esorics 2024
:
455-476
[doi]
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
Md. Nazmul Hoq
,
Jia-Wei Yao
,
Suryadipta Majumdar
,
Luis Suárez
,
Lingyu Wang 0001
,
Amine Boukhtouta
,
Makan Pourzandi
,
Mourad Debbabi
.
esorics 2024
:
123-144
[doi]
Enforcing the GDPR
François Hublet
,
David A. Basin
,
Srdan Krstic
.
esorics 2024
:
400-422
[doi]
Machine Learning for SAST: A Lightweight and Adaptable Approach
Lorenz Hüther
,
Karsten Sohr
,
Bernhard J. Berger
,
Hendrik Rothe
,
Stefan Edelkamp
.
esorics 2024
:
85-104
[doi]
Chaussette: A Symbolic Verification of Bitcoin Scripts
Vincent Jacquot
,
Benoit Donnet
.
esorics 2024
:
359-375
[doi]
Practical Randomized Lattice Gadget Decomposition with Application to FHE
Sohyun Jeon
,
Hyang-Sook Lee
,
Jeongeun Park 0001
.
esorics 2024
:
353-371
[doi]
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations
Shirin Kalantari
,
Pieter Philippaerts
,
Yana Dimova
,
Danny Hughes 0001
,
Wouter Joosen
,
Bart De Decker
.
esorics 2024
:
318-337
[doi]
Everlasting ROBOT: The Marvin Attack
Hubert Kario
.
esorics 2024
:
243-262
[doi]
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack
Sowoong Kim
,
Myeonggyun Han
,
Woongki Baek
.
esorics 2024
:
120-140
[doi]
Efficient Transparent Polynomial Commitments for zk-SNARKs
Sungwook Kim
,
Sungju Kim
,
Yulim Shin
,
Sunmi Kim
,
Jihye Kim
,
Hyunok Oh
.
esorics 2024
:
348-366
[doi]
Code-Based Secret Handshake Scheme, Revisited
Minkyu Kim
,
Hyung Tae Lee
.
esorics 2024
:
106-125
[doi]
Overview of Social Engineering Protection and Prevention Methods
Konstantinos Kontogeorgopoulos
,
Kyriakos Kritikos
.
esorics 2024
:
64-83
[doi]
Security of NVMe Offloaded Data in Large-Scale Machine Learning
Torsten Krauß
,
Raphael Götz
,
Alexandra Dmitrienko
.
esorics 2024
:
143-163
[doi]
Evaluation of an OPC UA-Based Access Control Enforcement Architecture
Björn Leander
,
Aida Causevic
,
Hans Hansson
,
Tomas Lindström
.
esorics 2024
:
124-144
[doi]
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations
Jehyun Lee
,
Zhe Xin
,
Melanie Ng Pei See
,
Kanav Sabharwal
,
Giovanni Apruzzese
,
Dinil Mon Divakaran
.
esorics 2024
:
162-182
[doi]
Creating Privacy Policies from Data-Flow Diagrams
Jens Leicht
,
Marvin Wagner
,
Maritta Heisel
.
esorics 2024
:
433-453
[doi]
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
Shaoyu Li
,
Shanghao Shi
,
Yang Xiao 0010
,
Chaoyu Zhang
,
Y. Thomas Hou 0001
,
Wenjing Lou
.
esorics 2024
:
306-326
[doi]
LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing
Wenqing Liu
,
An-I Andy Wang
.
esorics 2024
:
507-525
[doi]
When is Slower Block Propagation More Profitable for Large Miners?
Zhichun Lu
,
Ren Zhang
.
esorics 2024
:
285-305
[doi]
Two-Message Authenticated Key Exchange from Public-Key Encryption
You Lyu
,
Shengli Liu 0001
.
esorics 2024
:
414-434
[doi]
Optimally-Fair Multi-party Exchange Without Trusted Parties
Ivo Maffei
,
A. W. Roscoe 0001
.
esorics 2024
:
313-333
[doi]
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
Jules Maire
,
Damien Vergnaud
.
esorics 2024
:
435-454
[doi]
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
Jules Maire
,
Damien Vergnaud
.
esorics 2024
:
189-208
[doi]
Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing
Matthieu Meeus
,
Florent Guépin
,
Ana-Maria Cretu 0002
,
Yves-Alexandre de Montjoye
.
esorics 2024
:
380-399
[doi]
Syntax-Aware Mutation for Testing the Solidity Compiler
Charalambos Mitropoulos
,
Thodoris Sotiropoulos
,
Sotiris Ioannidis
,
Dimitris Mitropoulos
.
esorics 2024
:
327-347
[doi]
On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning Network
Charmaine Ndolo
,
Florian Tschorsch
.
esorics 2024
:
411-427
[doi]
Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems
Ivan De Oliveira Nunes
,
Peter Rindal
,
Maliheh Shirvanian
.
esorics 2024
:
290-312
[doi]
A New Model for Testing IPv6 Fragment Handling
Edoardo Di Paolo
,
Enrico Bassetti
,
Angelo Spognardi
.
esorics 2024
:
277-294
[doi]
Timely Identification of Victim Addresses in DeFi Attacks
Bahareh Parhizkari
,
Antonio Ken Iannillo
,
Christof Ferreira Torres
,
Sebastian Banescu
,
Joseph Jiaqi Xu
,
Radu State
.
esorics 2024
:
394-410
[doi]
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models
Bipin Paudel
,
George T. Amariucai
.
esorics 2024
:
3-22
[doi]
stoRNA: Stateless Transparent Proofs of Storage-time
Reyhaneh Rabaninejad
,
Behzad Abdolmaleki
,
Giulio Malavolta
,
Antonis Michalas
,
Amir Nabizadeh
.
esorics 2024
:
389-410
[doi]
Up-to-Date Threat Modelling for Soft Privacy on Smart Cars
Mario Raciti
,
Giampaolo Bella
.
esorics 2024
:
454-473
[doi]
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps
Abdelrahman Ragab
,
Mohammad Mannan
,
Amr M. Youssef
.
esorics 2024
:
232-248
[doi]
PassGPT: Password Modeling and (Guided) Generation with Large Language Models
Javier Rando
,
Fernando Pérez-Cruz
,
Briland Hitaj
.
esorics 2024
:
164-183
[doi]
Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption
Bruno Rodrigues
,
Ivone Amorim
,
Ivan Silva
,
Alexandra Mendes
.
esorics 2024
:
199-215
[doi]
Learning Type Inference for Enhanced Dataflow Analysis
Lukas Seidel
,
Sedick David Baker Effendi
,
Xavier Pinho
,
Konrad Rieck
,
Brink van der Merwe
,
Fabian Yamaguchi
.
esorics 2024
:
184-203
[doi]
Review on Privacy and Trust Methodologies in Cloud Computing
Stavros Simou
,
Aikaterini-Georgia Mavroeidi
,
Christos Kalloniatis
.
esorics 2024
:
494-505
[doi]
Skade - A Challenge Management System for Cyber Threat Hunting
Teodor Sommestad
,
Henrik Karlzén
,
Hanna Kvist
,
Hanna Gustafsson
.
esorics 2024
:
84-103
[doi]
Threshold Fully Homomorphic Encryption Over the Torus
Yukimasa Sugizaki
,
Hikaru Tsuchida
,
Takuya Hayashi
,
Koji Nuida
,
Akira Nakashima
,
Toshiyuki Isshiki
,
Kengo Mori
.
esorics 2024
:
45-65
[doi]
Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word Prediction
Mohamed Suliman
,
Douglas J. Leith
.
esorics 2024
:
105-122
[doi]
AttnCall: Refining Indirect Call Targets in Binaries with Attention
Rui Sun
,
Yinggang Guo
,
ZiCheng Wang
,
Qingkai Zeng 0002
.
esorics 2024
:
391-409
[doi]
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Marcel Tiepelt
,
Edward Eaton
,
Douglas Stebila
.
esorics 2024
:
168-188
[doi]
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis
Heitor Uchoa
,
Vipul Arora
,
Dennis Vermoen
,
Marco Ottavi
,
Nikolaos Alachiotis 0001
.
esorics 2024
:
203-221
[doi]
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers
Vik Vanderlinden
,
Tom van Goethem
,
Mathy Vanhoef
.
esorics 2024
:
3-22
[doi]
Threat Analysis in Dairy Farming 4.0
Karl Jonatan Due Vatn
,
Georgios Kavallieratos
,
Sokratis K. Katsikas
.
esorics 2024
:
46-63
[doi]
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Carmen Wabartha
,
Julian Liedtke
,
Nicolas Huber
,
Daniel Rausch 0001
,
Ralf Küsters
.
esorics 2024
:
209-228
[doi]
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
Konrad Wolsing
,
Dominik Kus
,
Eric Wagner 0003
,
Jan Pennekamp
,
Klaus Wehrle
,
Martin Henze
.
esorics 2024
:
102-122
[doi]
Privacy-Preserving Split Learning via Pareto Optimal Search
Xi Yu
,
Liyao Xiang
,
Shiming Wang
,
Chengnian Long
.
esorics 2024
:
123-142
[doi]
Aion: Secure Transaction Ordering Using TEEs
Pouriya Zarbafian
,
Vincent Gramoli
.
esorics 2024
:
332-350
[doi]
Secure Multiparty Sampling of a Biased Coin for Differential Privacy
Amir Zarei
,
Staal Amund Vinterbo
.
esorics 2024
:
310-320
[doi]
On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in Android
Ziyi Zhou
,
Xuangan Xiao
,
Tianxiao Hou
,
Yikun Hu
,
Dawu Gu
.
esorics 2024
:
250-270
[doi]
Sign in
or
sign up
to see more results.