


default search action
DPM/CBT@ESORICS 2017: Oslo, Norway
- Joaquín García-Alfaro

, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Lecture Notes in Computer Science 10436, Springer 2017, ISBN 978-3-319-67815-3
Privacy, Logics, and Computational Models
- Florian Kammüller:

A Proof Calculus for Attack Trees in Isabelle. 3-18 - Olaf Owe

, Toktam Ramezanifarkhani:
Confidentiality of Interactions in Concurrent Object-Oriented Systems. 19-34 - Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser:

Using Oblivious RAM in Genomic Studies. 35-52
Privacy and Encrypted Search
- Yuuji Furuta, Naoto Yanai

, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara:
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model. 55-69 - Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann:

Searchable Encrypted Relational Databases: Risks and Countermeasures. 70-85 - Thaís Bardini Idalino

, Dayana Spagnuelo
, Jean Everson Martina:
Private Verification of Access on Medical Data: An Initial Study. 86-103
Data Privacy, Data Mining, and Applications
- Toru Nakamura, Welderufael B. Tesfay, Shinsaku Kiyomoto, Jetzabel M. Serna:

Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences. 107-123 - Zhizhou Li, Ten-Hwang Lai:

δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining. 124-142 - Devris Isler

, Alptekin Küpçü
:
Threshold Single Password Authentication. 143-162 - Saffija Kasem-Madani, Michael Meier

, Martin Wehner:
Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization. 163-179
User Privacy
- Paul Georg Wagner

, Pascal Birnstill
, Erik Krempel
, Sebastian Bretthauer, Jürgen Beyerer:
Privacy Dashcam - Towards Lawful Use of Dashcams Through Enforcement of External Anonymization. 183-201 - Mojtaba Eskandari, Bruno Crispo, Anderson Santana de Oliveira:

DLoc: Distributed Auditing for Data Location Compliance in Cloud. 202-218 - Sanaz Taheri Boshrooyeh

, Alptekin Küpçü
:
Inonymous: Anonymous Invitation-Based System. 219-235
Applied Cryptography and Privacy
- Nesrine Kaaniche

, Maryline Laurent
, Pierre-Olivier Rocher, Christophe Kiennert, Joaquín García-Alfaro
:
PCS , A Privacy-Preserving Certification Scheme. 239-256 - James Dyer

, Martin E. Dyer
, Jie Xu:
Order-Preserving Encryption Using Approximate Integer Common Divisors. 257-274 - Giovanni Di Crescenzo, Brian A. Coan, Jonathan Kirsch:

Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks. 275-294
Consensus and Smart Contracts
- Wenting Li, Sébastien Andreina, Jens-Matthias Bohli, Ghassan Karame:

Securing Proof-of-Stake Blockchain Protocols. 297-315 - Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:

Merged Mining: Curse or Cure? 316-333 - Patrick McCorry, Ethan Heilman, Andrew Miller:

Atomically Trading with Roger: Gambling on the Success of a Hardfork. 334-353
Smart Contracts and Blockchain Identity
- Michael Fröwis, Rainer Böhme:

In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum. 357-372 - Sarah Azouvi, Mustafa Al-Bassam, Sarah Meiklejohn:

Who Am I? Secure Identity Registration on Distributed Ledgers. 373-389 - Daniel Augot, Hervé Chabanne, Thomas Chenevier, William George

, Laurent Lambert:
A User-Centric System for Verified Identities on the Bitcoin Blockchain. 390-407
Short Papers
- Elias Rohrer

, Jann-Frederik Laß, Florian Tschorsch:
Towards a Concurrent and Distributed Route Selection for Payment Channel Networks. 411-419 - A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine:

Graphene: A New Protocol for Block Propagation Using Set Reconciliation. 420-428 - Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen:

Short Paper: Revisiting Difficulty Control for Blockchain Systems. 429-436 - Björn Tackmann:

Secure Event Tickets on a Blockchain. 437-444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














