Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,162
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Computer Security – ESORICS 2016
other
Editor(s):
Ioannis Askoxylakis
,
Sotiris Ioannidis
,
Sokratis Katsikas
,
Catherine Meadows
Publication date
(Print):
2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Author and book information
Book
ISBN (Print):
978-3-319-45743-7
ISBN (Electronic):
978-3-319-45744-4
Publication date (Print):
2016
DOI:
10.1007/978-3-319-45744-4
SO-VID:
f44a798a-ecc9-4a85-9218-f33bb3de8f38
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
pp. 27
Toward an Efficient Website Fingerprinting Defense
pp. 47
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
pp. 69
Comparing Password Ranking Algorithms on Real-World Password Datasets
pp. 91
Scalable Two-Factor Authentication Using Historical Data
pp. 111
On the Implications of Zipf’s Law in Passwords
pp. 135
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
pp. 154
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
pp. 173
Efficient Encrypted Keyword Search for Multi-user Data Sharing
pp. 199
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
pp. 217
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
pp. 238
A Machine Learning Approach for Detecting Third-Party Trackers on the Web
pp. 261
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
pp. 279
Attribute-Based Signatures for Supporting Anonymous Certification
pp. 301
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes
pp. 324
Lightweight Delegatable Proofs of Storage
pp. 344
Anonymous RAM
pp. 363
Efficient Sanitizable Signatures Without Random Oracles
pp. 383
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook
pp. 401
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images
pp. 422
NaClDroid: Native Code Isolation for Android Applications
pp. 440
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
pp. 458
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
pp. 477
Android Permission Recommendation Using Transitive Bayesian Inference Model
pp. 501
Spot the Difference: Secure Multi-execution and Multiple Facets
pp. 520
On Reductions from Multi-Domain Noninterference to the Two-Level Case
pp. 538
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries
pp. 561
Let’s Face It: Faceted Values for Taint Tracking
pp. 581
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming
pp. 602
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets
Similar content
1,162
Computer Security – ESORICS 2019
Authors:
11th European Symposium on Research in Computer Security: ESORICS’06
Authors:
F Besson
,
G Dufay
,
T Jensen
ESORICS’17
Authors:
Chandra Swarup
See all similar
Cited by
2
Fidelius: Protecting User Secrets from Compromised Browsers
Authors:
Jonathan Cogan
,
Saba Eskandarian
,
Dillon Franke
…
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers
Authors:
Bharat Srinivasan
,
Najmeh Miramirkhani
,
Nick Nikiforakis
…
See all cited by