↓ Skip to main content

Computer Security – ESORICS 2019

Overview of attention for book
Cover of 'Computer Security – ESORICS 2019'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs
  3. Altmetric Badge
    Chapter 2 Uncovering Information Flow Policy Violations in C Programs (Extended Abstract)
  4. Altmetric Badge
    Chapter 3 BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning
  5. Altmetric Badge
    Chapter 4 Static Detection of Uninitialized Stack Variables in Binary Code
  6. Altmetric Badge
    Chapter 5 Towards Automated Application-Specific Software Stacks
  7. Altmetric Badge
    Chapter 6 Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices
  8. Altmetric Badge
    Chapter 7 Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
  9. Altmetric Badge
    Chapter 8 Feistel Structures for MPC, and More
  10. Altmetric Badge
    Chapter 9 Arithmetic Garbling from Bilinear Maps
  11. Altmetric Badge
    Chapter 10 SEPD: An Access Control Model for Resource Sharing in an IoT Environment
  12. Altmetric Badge
    Chapter 11 Nighthawk: Transparent System Introspection from Ring -3
  13. Altmetric Badge
    Chapter 12 Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement
  14. Altmetric Badge
    Chapter 13 Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics
  15. Altmetric Badge
    Chapter 14 Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
  16. Altmetric Badge
    Chapter 15 Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption
  17. Altmetric Badge
    Chapter 16 Generic Multi-keyword Ranked Search on Encrypted Cloud Data
  18. Altmetric Badge
    Chapter 17 An Efficiently Searchable Encrypted Data Structure for Range Queries
  19. Altmetric Badge
    Chapter 18 GDPiRated – Stealing Personal Information On- and Offline
  20. Altmetric Badge
    Chapter 19 Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation
  21. Altmetric Badge
    Chapter 20 OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform
  22. Altmetric Badge
    Chapter 21 Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping
  23. Altmetric Badge
    Chapter 22 IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
  24. Altmetric Badge
    Chapter 23 Strongly Secure Identity-Based Key Exchange with Single Pairing Operation
  25. Altmetric Badge
    Chapter 24 A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
  26. Altmetric Badge
    Chapter 25 Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
  27. Altmetric Badge
    Chapter 26 The Risks of WebGL: Analysis, Evaluation and Detection
  28. Altmetric Badge
    Chapter 27 Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks
  29. Altmetric Badge
    Chapter 28 Fingerprint Surface-Based Detection of Web Bot Detectors
  30. Altmetric Badge
    Chapter 29 Testing for Integrity Flaws in Web Sessions
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

5 tweeters
1 Wikipedia page

Readers on

21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Computer Security – ESORICS 2019
Published by
Springer International Publishing, January 2019
DOI 10.1007/978-3-030-29962-0
978-3-03-029961-3, 978-3-03-029962-0

Kazue Sako, Steve Schneider, Peter Y. A. Ryan

Twitter Demographics

The data shown below were collected from the profiles of 5 tweeters who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 38%
Student > Doctoral Student 3 14%
Other 2 10%
Student > Bachelor 2 10%
Professor > Associate Professor 2 10%
Other 3 14%
Unknown 1 5%
Readers by discipline Count As %
Computer Science 15 71%
Engineering 4 19%
Unknown 2 10%