Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation (Englisch)
Freier Zugriff
- Neue Suche nach: Kononchuk, Dmitry
- Neue Suche nach: Erkin, Zekeriya
- Neue Suche nach: Lubbe, Jan C. A.
- Neue Suche nach: Lagendijk, Reginald L.
- Neue Suche nach: Kononchuk, Dmitry
- Neue Suche nach: Erkin, Zekeriya
- Neue Suche nach: Lubbe, Jan C. A.
- Neue Suche nach: Lagendijk, Reginald L.
In:
Computer Security – ESORICS 2013
8
;
418-442
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation
-
Beteiligte:Kononchuk, Dmitry ( Autor:in ) / Erkin, Zekeriya ( Autor:in ) / Lubbe, Jan C. A. ( Autor:in ) / Lagendijk, Reginald L. ( Autor:in )
-
Erschienen in:Computer Security – ESORICS 2013 , 8 ; 418-442Lecture Notes in Computer Science ; 8134, 8 ; 418-442
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:25 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ LimitsDamgård, Ivan / Keller, Marcel / Larraia, Enrique / Pastro, Valerio / Scholl, Peter / Smart, Nigel P. et al. | 2013
- 19
-
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤnCamenisch, Jan / Enderlein, Robert R. / Shoup, Victor et al. | 2013
- 38
-
Privacy-Preserving Accountable ComputationBackes, Michael / Fiore, Dario / Mohammadi, Esfandiar et al. | 2013
- 57
-
Verifying Web Browser Extensions’ Compliance with Private-Browsing ModeLerner, Benjamin S. / Elberty, Liam / Poole, Neal / Krishnamurthi, Shriram et al. | 2013
- 75
-
A Quantitative Evaluation of Privilege Separation in Web Browser DesignsDong, Xinshu / Hu, Hong / Saxena, Prateek / Liang, Zhenkai et al. | 2013
- 94
-
Estimating Asset Sensitivity by Profiling UsersPark, Youngja / Gates, Christopher / Gates, Stephen C. et al. | 2013
- 111
-
Practical Secure Logging: Seekable Sequential Key GeneratorsMarson, Giorgia Azzurra / Poettering, Bertram et al. | 2013
- 129
-
Request-Based Comparable EncryptionFurukawa, Jun et al. | 2013
- 147
-
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the CloudWei, Lei / Reiter, Michael K. et al. | 2013
- 164
-
HI-CFG: Construction by Binary Analysis and Application to Attack PolymorphismCaselden, Dan / Bazhanyuk, Alex / Payer, Mathias / McCamant, Stephen / Song, Dawn et al. | 2013
- 182
-
AnDarwin: Scalable Detection of Semantically Similar Android ApplicationsCrussell, Jonathan / Gibler, Clint / Chen, Hao et al. | 2013
- 200
-
BISTRO: Binary Component Extraction and Embedding for Software Security ApplicationsDeng, Zhui / Zhang, Xiangyu / Xu, Dongyan et al. | 2013
- 219
-
Vulnerable Delegation of DNS ResolutionHerzberg, Amir / Shulman, Haya et al. | 2013
- 237
-
Formal Approach for Route Agility against Persistent AttackersJafarian, Jafar Haadi / Al-Shaer, Ehab / Duan, Qi et al. | 2013
- 255
-
Plug-and-Play IP SecurityGilad, Yossi / Herzberg, Amir et al. | 2013
- 273
-
Managing the Weakest LinkLaszka, Aron / Johnson, Benjamin / Schöttle, Pascal / Grossklags, Jens / Böhme, Rainer et al. | 2013
- 291
-
Automated Security Proofs for Almost-Universal Hash for MAC VerificationGagné, Martin / Lafourcade, Pascal / Lakhnech, Yassine et al. | 2013
- 309
-
Bounded Memory Protocols and Progressing Collaborative SystemsKanovich, Max / Ban Kirigin, Tajana / Nigam, Vivek / Scedrov, Andre et al. | 2013
- 327
-
Universally Composable Key-ManagementKremer, Steve / Künnemann, Robert / Steel, Graham et al. | 2013
- 345
-
A Cryptographic Analysis of OPACITYDagdelen, Özgür / Fischlin, Marc / Gagliardoni, Tommaso / Marson, Giorgia Azzurra / Mittelbach, Arno / Onete, Cristina et al. | 2013
- 363
-
Symbolic Probabilistic Analysis of Off-Line GuessingConchinha, Bruno / Basin, David / Caleiro, Carlos et al. | 2013
- 381
-
ASICS: Authenticated Key Exchange Security Incorporating Certification SystemsBoyd, Colin / Cremers, Cas / Feltz, Michèle / Paterson, Kenneth G. / Poettering, Bertram / Stebila, Douglas et al. | 2013
- 400
-
Efficient Privacy-Enhanced Familiarity-Based Recommender SystemJeckmans, Arjan / Peter, Andreas / Hartel, Pieter et al. | 2013
- 418
-
Privacy-Preserving User Data Oriented Services for Groups with Dynamic ParticipationKononchuk, Dmitry / Erkin, Zekeriya / Lubbe, Jan C. A. / Lagendijk, Reginald L. et al. | 2013
- 443
-
Privacy-Preserving Matching of Community-Contributed ContentAlmishari, Mishari / Gasti, Paolo / Tsudik, Gene / Oguz, Ekin et al. | 2013
- 463
-
Ballot Secrecy and Ballot Independence CoincideSmyth, Ben / Bernhard, David et al. | 2013
- 481
-
Election Verifiability or Ballot Privacy: Do We Need to Choose?Cuvelier, Édouard / Pereira, Olivier / Peters, Thomas et al. | 2013
- 499
-
Enforcing Privacy in the Presence of Others: Notions, Formalisations and RelationsDong, Naipeng / Jonker, Hugo / Pang, Jun et al. | 2013
- 517
-
Mining Malware Specifications through Static Reachability AnalysisMacedo, Hugo Daniel / Touili, Tayssir et al. | 2013
- 536
-
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object DependenciesDai, Jun / Sun, Xiaoyan / Liu, Peng et al. | 2013
- 556
-
Measuring and Detecting Malware Downloads in Live Network TrafficVadrevu, Phani / Rahbarinia, Babak / Perdisci, Roberto / Li, Kang / Antonakakis, Manos et al. | 2013
- 574
-
Automated Certification of Authorisation Policy ResistanceGriesmayer, Andreas / Morisset, Charles et al. | 2013
- 592
-
Fine-Grained Access Control System Based on Outsourced Attribute-Based EncryptionLi, Jin / Chen, Xiaofeng / Li, Jingwei / Jia, Chunfu / Ma, Jianfeng / Lou, Wenjing et al. | 2013
- 610
-
Purpose Restrictions on Information UseTschantz, Michael Carl / Datta, Anupam / Wing, Jeannette M. et al. | 2013
- 628
-
Distributed Shuffling for Preserving Access ConfidentialityCapitani di Vimercati, Sabrina / Foresti, Sara / Paraboschi, Stefano / Pelosi, Gerardo / Samarati, Pierangela et al. | 2013
- 646
-
Range Extension Attacks on Contactless Smart CardsOren, Yossef / Schirman, Dvir / Wool, Avishai et al. | 2013
- 664
-
CellFlood: Attacking Tor Onion Routers on the CheapBarbera, Marco Valerio / Kemerlis, Vasileios P. / Pappas, Vasilis / Keromytis, Angelos D. et al. | 2013
- 682
-
Nowhere to Hide: Navigating around Privacy in Online Social NetworksHumbert, Mathias / Studer, Théophile / Grossglauser, Matthias / Hubaux, Jean-Pierre et al. | 2013
- 700
-
Current Events: Identifying Webpages by Tapping the Electrical OutletClark, Shane S. / Mustafa, Hossen / Ransford, Benjamin / Sorber, Jacob / Fu, Kevin / Xu, Wenyuan et al. | 2013
- 718
-
Eliminating Cache-Based Timing Attacks with Instruction-Based SchedulingStefan, Deian / Buiras, Pablo / Yang, Edward Z. / Levy, Amit / Terei, David / Russo, Alejandro / Mazières, David et al. | 2013
- 736
-
Data-Confined HTML5 ApplicationsAkhawe, Devdatta / Li, Frank / He, Warren / Saxena, Prateek / Song, Dawn et al. | 2013
- 755
-
KQguard: Binary-Centric Defense against Kernel Queue Injection AttacksWei, Jinpeng / Zhu, Feng / Pu, Calton et al. | 2013
- 775
-
Run-Time Enforcement of Information-Flow Properties on AndroidJia, Limin / Aljuraidan, Jassim / Fragkaki, Elli / Bauer, Lujo / Stroucken, Michael / Fukushima, Kazuhide / Kiyomoto, Shinsaku / Miyake, Yutaka et al. | 2013