Limit search to available items
Book Cover
E-book
Author European Symposium on Research in Computer Security (18th : 2013 : Egham, England)

Title Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings / Jason Crampton, Sushil Jajodia, Keith Mayes (eds.)
Published Heidelberg : Springer, [2013]
©2013

Copies

Description 1 online resource (xviii, 794 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 8134
LNCS sublibrary SL 4 security and cryptology
Lecture notes in computer science ; 8134.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Cryptography and Computation. Practical Covertly Secure MPC for Dishonest Majority -- Or: Breaking the SPDZ Limits / Ivan Damgård [and others] -- Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn / Jan Camenisch, Robert R. Enderlein and Victor Shoup -- Privacy-Preserving Accountable Computation / Michael Backes, Dario Fiore and Esfandiar Mohammadi -- Measurement and Evaluation. Verifying Web Browser Extensions' Compliance with Private-Browsing Mode / Benjamin S. Lerner [and others] -- A Quantitative Evaluation of Privilege Separation in Web Browser Designs / Xinshu Dong [and others] -- Estimating Asset Sensitivity by Profiling Users / Youngja Park, Christopher Gates and Stephen C. Gates -- Applications of Cryptography. Practical Secure Logging: Seekable Sequential Key Generators / Giorgia Azzurra Marson and Bertram Poettering -- Request-Based Comparable Encryption / Jun Furukawa -- Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud / Lei Wei and Michael K. Reiter
Code Analysis. HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism / Dan Caselden [and others] -- AnDarwin: Scalable Detection of Semantically Similar Android Applications / Jonathan Crussell, Clint Gibler and Hao Chen -- BISTRO: Binary Component Extraction and Embedding for Software Security Applications / Zhui Deng, Xiangyu Zhang and Dongyan Xu -- Network Security. Vulnerable Delegation of DNS Resolution / Amir Herzberg and Haya Shulman -- Formal Approach for Route Agility against Persistent Attackers / Jafar Haadi Jafarian, Ehab Al-Shaer and Qi Duan -- Plug-and-Play IP Security / Yossi Gilad and Amir Herzberg -- Formal Models and Methods. Managing the Weakest Link / Aron Laszka [and others] -- Automated Security Proofs for Almost-Universal Hash for MAC Verification / Martin Gagné, Pascal Lafourcade and Yassine Lakhnech -- Bounded Memory Protocols and Progressing Collaborative Systems / Max Kanovich [and others] -- Universally Composable Key-Management / Steve Kremer, Robert Künnemann and Graham Steel
Protocol Analysis. A Cryptographic Analysis of OPACITY / Özgür Dagdelen [and others] -- Symbolic Probabilistic Analysis of Off-Line Guessing / Bruno Conchinha, David Basin and Carlos Caleiro -- ASICS: Authenticated Key Exchange Security Incorporating Certification Systems / Colin Boyd [and others] -- Privacy Enhancing Models and Technologies. Efficient Privacy-Enhanced Familiarity-Based Recommender System / Arjan Jeckmans, Andreas Peter and Pieter Hartel -- Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation / Dmitry Kononchuk [and others] -- Privacy-Preserving Matching of Community-Contributed Content / Mishari Almishari [and others] -- E-voting and Privacy. Ballot Secrecy and Ballot Independence Coincide / Ben Smyth and David Bernhard -- Election Verifiability or Ballot Privacy: Do We Need to Choose? / Édouard Cuvelier, Olivier Pereira and Thomas Peters -- Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations / Naipeng Dong, Hugo Jonker and Jun Pang
Malware Detection. Mining Malware Specifications through Static Reachability Analysis / Hugo Daniel Macedo and Tayssir Touili -- Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies / Jun Dai, Xiaoyan Sun and Peng Liu -- Measuring and Detecting Malware Downloads in Live Network Traffic / Phani Vadrevu [and others] -- Access Control. Automated Certification of Authorisation Policy Resistance / Andreas Griesmayer and Charles Morisset -- Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption / Jin Li [and others] -- Purpose Restrictions on Information Use / Michael Carl Tschantz, Anupam Datta and Jeannette M. Wing -- Distributed Shuffling for Preserving Access Confidentiality / Sabrina De Capitani di Vimercati [and others]
Attacks. Range Extension Attacks on Contactless Smart Cards / Yossef Oren, Dvir Schirman and Avishai Wool -- CellFlood: Attacking Tor Onion Routers on the Cheap / Marco Valerio Barbera [and others] -- Nowhere to Hide: Navigating around Privacy in Online Social Networks / Mathias Humbert [and others] -- Current Events: Identifying Webpages by Tapping the Electrical Outlet / Shane S. Clark [and others] -- Language-Based Protection. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling / Deian Stefan [and others] -- Data-Confined HTML5 Applications / Devdatta Akhawe [and others] -- KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks / Jinpeng Wei, Feng Zhu and Calton Pu -- Run-Time Enforcement of Information-Flow Properties on Android / Limin Jia [and others]
Summary This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks
Bibliography Includes bibliographical references and index
Notes Online resource; title from PDF title page (SpringerLink, viewed September 26, 2013)
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Data protection -- Congresses
Computer security.
Computer Security
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Data protection
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Crampton, Jason, editor
Jajodia, Sushil, editor
Mayes, Keith E., editor
ISBN 9783642402036
3642402038
364240202X
9783642402029