Limit search to available items
Book Cover
E-book
Author European Symposium on Research in Computer Security (17th : 2012 : Pisa, Italy)

Title Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings / Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7459
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7459.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Modeling and Enhancing Android's Permission System / Elli Fragkaki, Lujo Bauer, Limin Jia and David Swasey -- Hardening Access Control and Data Protection in GFS-like File Systems / James Kelley, Roberto Tamassia and Nikos Triandopoulos -- Attack of the Clones: Detecting Cloned Applications on Android Markets / Jonathan Crussell, Clint Gibler and Hao Chen -- Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing / Arnar Birgisson, Daniel Hedin and Andrei Sabelfeld -- Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions / Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu and Christopher Lynch, et al. -- Deciding Epistemic and Strategic Properties of Cryptographic Protocols / Henning Schnoor -- Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model / Arif Akram Khan and Philip W.L. Fong -- Deciding Security for a Fragment of ASLan / Sebastian Mödersheim -- A Probabilistic Framework for Localization of Attackers in MANETs / Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia and Paulo Shakarian -- Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN / Ruben Rios, Jorge Cuellar and Javier Lopez -- Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks / Adam J. Aviv, Micah Sherr, Matt Blaze and Jonathan M. Smith -- Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties / Italo Dacosta, Mustaque Ahamad and Patrick Traynor
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle / Ralph Holz, Thomas Riedmaier, Nils Kammenhuber and Georg Carle -- A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols / Simon Eberz, Martin Strohmeier, Matthias Wilhelm and Ivan Martinovic -- The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs / Ahmad-Reza Sadeghi, Steffen Schulz and Vijay Varadharajan -- Security of Patched DNS / Amir Herzberg and Haya Shulman -- Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach / Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu and Peng Liu -- Exploring Linkability of User Reviews / Mishari Almishari and Gene Tsudik -- Formal Analysis of Privacy in an eHealth Protocol / Naipeng Dong, Hugo Jonker and Jun Pang -- PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters / Jinkyu Koo, Xiaojun Lin and Saurabh Bagchi -- SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags / Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou -- Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data / Tzipora Halevi, Di Ma, Nitesh Saxena and Tuo Xiang -- Enhancing Location Privacy for Electric Vehicles (at the Right time) / Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou -- Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System / Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Škorić, Dave Singelée and Srdjan Čapkun
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System / Yvo Desmedt and Pyrros Chaidos -- Defining Privacy for Weighted Votes, Single and Multi-voter Coercion / Jannik Dreier, Pascal Lafourcade and Yassine Lakhnech -- TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks / Alex Biryukov, Ivan Pustogarov and Ralf-Philipp Weinmann -- Introducing the gMix Open Source Framework for Mix Implementations / Karl-Peter Fuchs, Dominik Herrmann and Hannes Federrath -- Secure and Efficient Outsourcing of Sequence Comparisons / Marina Blanton, Mikhail J. Atallah, Keith B. Frikken and Qutaibah Malluhi -- Third-Party Private DFA Evaluation on Encrypted Files in the Cloud / Lei Wei and Michael K. Reiter -- New Algorithms for Secure Outsourcing of Modular Exponentiations / Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang and Wenjing Lou -- Towards Symbolic Encryption Schemes / Naveed Ahmed, Christian D. Jensen and Erik Zenner -- Decision Procedures for Simulatability / Charanjit S. Jutla and Arnab Roy -- Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems / Deepak D'Souza and K.R. Raghavendra -- Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext / Fuchun Guo, Yi Mu and Willy Susilo -- Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience / David Galindo, Javier Herranz and Jorge Villar -- Unique Group Signatures / Matthew Franklin and Haibin Zhang -- Relations among Notions of Privacy for RFID Authentication Protocols / Daisuke Moriyama, Shin'ichiro Matsuo and Miyako Ohkubo
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation / Kin Ying Yu, Tsz Hon Yuen, Sherman S.M. Chow, Siu Ming Yiu and Lucas C.K. Hui -- Dismantling iClass and iClass Elite / Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and Milosch Meriac -- Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms / Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar and Tolga Yalcin, et al. -- Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal / Cas Cremers and Michèle Feltz -- Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption / Tibor Jager, Sebastian Schinzel and Juraj Somorovsky -- On the Security of Password Manager Database Formats / Paolo Gasti and Kasper B. Rasmussen -- Scalable Telemetry Classification for Automated Malware Detection / Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber and Jonathan Keller, et al. -- Abstraction-Based Malware Analysis Using Rewriting and Model Checking / Philippe Beaucamps, Isabelle Gnaedig and Jean-Yves Marion -- Detecting Phishing Emails the Natural Language Way / Rakesh Verma, Narasimha Shashidhar and Nabil Hossain -- JVM-Portable Sandboxing of Java's Native Libraries / Mengtao Sun and Gang Tan -- Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions / Yongzheng Wu, Sai Sathyanarayan, Roland H.C. Yap and Zhenkai Liang -- SocialImpact: Systematic Analysis of Underground Social Dynamics / Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi
Summary This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security
Analysis Computer science
Software engineering
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Notes English
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Data protection -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Data protection
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Foresti, Sara.
Yung, Moti.
Martinelli, Fabio, 1969-
ISBN 9783642331671
364233167X
3642331661
9783642331664
Other Titles ESORICS 2012