↓ Skip to main content

Computer Security – ESORICS 2016

Overview of attention for book
Cover of 'Computer Security – ESORICS 2016'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
  3. Altmetric Badge
    Chapter 2 Toward an Efficient Website Fingerprinting Defense
  4. Altmetric Badge
    Chapter 3 Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
  5. Altmetric Badge
    Chapter 4 Comparing Password Ranking Algorithms on Real-World Password Datasets
  6. Altmetric Badge
    Chapter 5 Scalable Two-Factor Authentication Using Historical Data
  7. Altmetric Badge
    Chapter 6 On the Implications of Zipf’s Law in Passwords
  8. Altmetric Badge
    Chapter 7 PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
  9. Altmetric Badge
    Chapter 8 An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
  10. Altmetric Badge
    Chapter 9 Efficient Encrypted Keyword Search for Multi-user Data Sharing
  11. Altmetric Badge
    Chapter 10 Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
  12. Altmetric Badge
    Chapter 11 Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
  13. Altmetric Badge
    Chapter 12 A Machine Learning Approach for Detecting Third-Party Trackers on the Web
  14. Altmetric Badge
    Chapter 13 Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
  15. Altmetric Badge
    Chapter 14 Attribute-Based Signatures for Supporting Anonymous Certification
  16. Altmetric Badge
    Chapter 15 Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes
  17. Altmetric Badge
    Chapter 16 Lightweight Delegatable Proofs of Storage
  18. Altmetric Badge
    Chapter 17 Anonymous RAM
  19. Altmetric Badge
    Chapter 18 Efficient Sanitizable Signatures Without Random Oracles
  20. Altmetric Badge
    Chapter 19 Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook
  21. Altmetric Badge
    Chapter 20 Hey, You, Get Off of My Image: Detecting Data Residue in Android Images
  22. Altmetric Badge
    Chapter 21 NaClDroid: Native Code Isolation for Android Applications
  23. Altmetric Badge
    Chapter 22 AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
  24. Altmetric Badge
    Chapter 23 Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
  25. Altmetric Badge
    Chapter 24 Android Permission Recommendation Using Transitive Bayesian Inference Model
  26. Altmetric Badge
    Chapter 25 Spot the Difference: Secure Multi-execution and Multiple Facets
  27. Altmetric Badge
    Chapter 26 On Reductions from Multi-Domain Noninterference to the Two-Level Case
  28. Altmetric Badge
    Chapter 27 Flexible Manipulation of Labeled Values for Information-Flow Control Libraries
  29. Altmetric Badge
    Chapter 28 Let’s Face It: Faceted Values for Taint Tracking
  30. Altmetric Badge
    Chapter 29 IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming
  31. Altmetric Badge
    Chapter 30 Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (90th percentile)
  • High Attention Score compared to outputs of the same age and source (86th percentile)

Mentioned by

news
1 news outlet
twitter
8 X users
facebook
1 Facebook page

Citations

dimensions_citation
6 Dimensions

Readers on

mendeley
81 Mendeley