ESORICS

AcronymDefinition
ESORICSEuropean Symposium on Research in Computer Security
References in periodicals archive ?
Lee, Discovering novel attack strategies from INFOSEC alerts, In Proceeding of 9th European Symposium on Research in Computer Security (ESORICS 2004), pp.
Weng, "Verifiable Computation on Outsourced Encrypted Data," in Computer Security ESORICS 2014, vol.
Learning Fingerprints for a Database Intrusion Detection System, ESORICS: Proc.
Klein, "Valuation of trust in open networks," In ESORICS 94.
Li et al., "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proceedings of the 14th European Conference on Research in Computer Security (ESORICS '09), pp.
of the 14th European Symposium on Research in Computer Security, ESORICS 2009, pp.355-370, 2009.
Wang, "On the implications of zipfs law in passwords," Proceedings of ESORICS, pp.
Naslund, "The Curupira-2 block cipher for constrained platforms: Specification and benchmarking," in Proceedings of the 1st International Workshop on Privacy in Location-Based Applications 13th European Symposium on Research in Computer Security (ESORICS '08), vol.
Lee, "Discovering Novel Attack Strategies from INFOSEC Alerts," in Proceedings of the Computer Security (ESORICS '04), vol.
Anderson, "Sybil-resistant DHT routing," in ESORICS, Sept.
Ha, "A new formal proof model for RFID location privacy," in Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS '08), pp.