Limit search to available items
Book Cover
E-book
Author European Symposium on Research in Computer Security (16th : 2011 : Louvain, Belgium)

Title Computer security-- ESORICS 2011 : 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011, proceedings / Vijay Atluri, Claudia Diaz (eds.)
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (xiv, 686 pages)
Series Lecture notes in computer science ; 6879
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6879.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: Wireless Security -- Secure Localization Using Dynamic Verifiers / Majid Ghaderi -- WiFiHop -- Mitigating the Evil Twin Attack through Multi-hop Detection / Carlos Ribeiro -- Investigation of Signal and Message Manipulations on the Wireless Channel / Srdjan Capkun -- Web Security I -- Protecting Private Web Content from Embedded Scripts / David Evans -- Preventing Web Application Injections with Complementary Character Coding / Phyllis Frankl -- Automatic and Precise Client-Side Protection against CSRF Attacks / Frank Piessens -- Web Security II -- Timing Is Everything: The Importance of History Detection / Gunnar Kreitz -- Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs / John C. Mitchell -- Systematic Analysis of XSS Sanitization in Web Application Frameworks / Dawn Song -- Forensics, Biometrics and Software Protection -- ̂ Who Wrote This Code? Identifying the Authors of Program Binaries / Barton P. Miller -- Secure and Efficient Protocols for Iris and Fingerprint Identification / Paolo Gasti -- Linear Obfuscation to Combat Symbolic Execution / Debin Gao -- DriverGuard: A Fine-Grained Protection on I/O Flows / Robert H. Deng -- Access Control -- Time-Storage Trade-Offs for Cryptographically-Enforced Access Control / Jason Crampton -- Socially Constructed Trust for Distributed Authorization / Valerio Genovese -- Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles / Tsz Hon Yuen -- Cryptography and Protocol Analysis -- How to Aggregate the CL Signature Scheme / Dominique Schroder -- Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2 / Cas Cremers -- Adapting Helios for Provable Ballot Privacy / Bogdan Warinschi -- Information Flow, Side Channels, and Vulnerability Analysis -- ̂ Remote Timing Attacks Are Still Practical / Nicola Tuveri
Note continued: Multi-run Security / Andrei Sabelfeld -- Automated Information Flow Analysis of Virtualized Infrastructures / Konrad Eriksson -- Scalable Analysis of Attack Scenarios / V.S. Subrahmanian -- Usability, Ttrust, and Economics of Security and Privacy -- Usability of Display-Equipped RFID Tags for Security Purposes / Ersin Uzun -- Forcing Johnny to Login Safely: Long-Term User Study of Forcing and Training Login Mechanisms / Ronen Margulies -- Towards a Mechanism for Incentivating Privacy / Luigi Sauro -- Investigating the OpenPGP Web of Trust / Georg Carle -- Privacy I -- Practical Complexity-Theoretic Analysis of Mix Systems / Dogan Kesdogan -- Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds / Daji Qiao -- Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective / Jean-Pierre Hubaux -- Privacy II -- New RFID Privacy Model / Bart Preneel -- Quantitative Information Flow, with a View / Michela Paolini -- To Release Or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data / Xiao Feng Wang -- Privacy III -- Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing / Ting Yu -- Supporting Concurrency in Private Data Outsourcing / Pierangela Samarati -- Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods / Christopher Piosecny
Summary Annotation The 36 papers are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; cryptography and protocol analysis; information flow, side channels, and vulnerability analysis; usability, trust, and economics of security and privacy; and privacy
Bibliography Includes bibliographical references and author index
In Springer eBooks
Subject Computer security -- Congresses
Informatique.
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Atluri, Vijay, 1956-
Diaz, Claudia (Assistant professor in Computer Security and Industrial Cryptography)
ISBN 9783642238222
364223822X
Other Titles ESORICS 2011