The Resource Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, Sara Foresti, Moti Yung, Fabio Martinelli (eds.), (electronic resource)

Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, Sara Foresti, Moti Yung, Fabio Martinelli (eds.), (electronic resource)

Label
Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
Title
Computer security-- ESORICS 2012
Title remainder
17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
Statement of responsibility
Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Title variation
ESORICS 2012
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security
Member of
Cataloging source
GW5XE
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7459
Label
Computer security-- ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, Sara Foresti, Moti Yung, Fabio Martinelli (eds.), (electronic resource)
Link
http://dx.doi.org/10.1007/978-3-642-33167-1
Publication
Note
International conference proceedings
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions
  • Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu and Christopher Lynch, et al.
  • Deciding Epistemic and Strategic Properties of Cryptographic Protocols
  • Henning Schnoor
  • Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model
  • Arif Akram Khan and Philip W. L. Fong
  • Deciding Security for a Fragment of ASLan
  • Sebastian Mödersheim
  • A Probabilistic Framework for Localization of Attackers in MANETs
  • Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia and Paulo Shakarian
  • Modeling and Enhancing Android's Permission System
  • Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
  • Ruben Rios, Jorge Cuellar and Javier Lopez
  • Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks
  • Adam J. Aviv, Micah Sherr, Matt Blaze and Jonathan M. Smith
  • Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties
  • Italo Dacosta, Mustaque Ahamad and Patrick Traynor --
  • Elli Fragkaki, Lujo Bauer, Limin Jia and David Swasey
  • Hardening Access Control and Data Protection in GFS-like File Systems
  • James Kelley, Roberto Tamassia and Nikos Triandopoulos
  • Attack of the Clones: Detecting Cloned Applications on Android Markets
  • Jonathan Crussell, Clint Gibler and Hao Chen
  • Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing
  • Arnar Birgisson, Daniel Hedin and Andrei Sabelfeld
  • Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach
  • Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu and Peng Liu
  • Exploring Linkability of User Reviews
  • Mishari Almishari and Gene Tsudik
  • Formal Analysis of Privacy in an eHealth Protocol
  • Naipeng Dong, Hugo Jonker and Jun Pang
  • PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters
  • Jinkyu Koo, Xiaojun Lin and Saurabh Bagchi
  • SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags
  • Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou
  • X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
  • Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
  • Tzipora Halevi, Di Ma, Nitesh Saxena and Tuo Xiang
  • Enhancing Location Privacy for Electric Vehicles (at the Right time)
  • Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou
  • Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
  • Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Škorić, Dave Singelée and Srdjan Čapkun --
  • Ralph Holz, Thomas Riedmaier, Nils Kammenhuber and Georg Carle
  • A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols
  • Simon Eberz, Martin Strohmeier, Matthias Wilhelm and Ivan Martinovic
  • The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
  • Ahmad-Reza Sadeghi, Steffen Schulz and Vijay Varadharajan
  • Security of Patched DNS
  • Amir Herzberg and Haya Shulman
  • Secure and Efficient Outsourcing of Sequence Comparisons
  • Marina Blanton, Mikhail J. Atallah, Keith B. Frikken and Qutaibah Malluhi
  • Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
  • Lei Wei and Michael K. Reiter
  • New Algorithms for Secure Outsourcing of Modular Exponentiations
  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang and Wenjing Lou
  • Towards Symbolic Encryption Schemes
  • Naveed Ahmed, Christian D. Jensen and Erik Zenner
  • Decision Procedures for Simulatability
  • Charanjit S. Jutla and Arnab Roy
  • Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System
  • Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems
  • Deepak D'Souza and K. R. Raghavendra
  • Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext
  • Fuchun Guo, Yi Mu and Willy Susilo
  • Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience
  • David Galindo, Javier Herranz and Jorge Villar
  • Unique Group Signatures
  • Matthew Franklin and Haibin Zhang
  • Relations among Notions of Privacy for RFID Authentication Protocols
  • Daisuke Moriyama, Shin'ichiro Matsuo and Miyako Ohkubo --
  • Yvo Desmedt and Pyrros Chaidos
  • Defining Privacy for Weighted Votes, Single and Multi-voter Coercion
  • Jannik Dreier, Pascal Lafourcade and Yassine Lakhnech
  • TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks
  • Alex Biryukov, Ivan Pustogarov and Ralf-Philipp Weinmann
  • Introducing the gMix Open Source Framework for Mix Implementations
  • Karl-Peter Fuchs, Dominik Herrmann and Hannes Federrath
  • Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
  • Tibor Jager, Sebastian Schinzel and Juraj Somorovsky
  • On the Security of Password Manager Database Formats
  • Paolo Gasti and Kasper B. Rasmussen
  • Scalable Telemetry Classification for Automated Malware Detection
  • Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber and Jonathan Keller, et al.
  • Abstraction-Based Malware Analysis Using Rewriting and Model Checking
  • Philippe Beaucamps, Isabelle Gnaedig and Jean-Yves Marion
  • Detecting Phishing Emails the Natural Language Way
  • Rakesh Verma, Narasimha Shashidhar and Nabil Hossain
  • PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation
  • JVM-Portable Sandboxing of Java's Native Libraries
  • Mengtao Sun and Gang Tan
  • Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions
  • Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap and Zhenkai Liang
  • SocialImpact: Systematic Analysis of Underground Social Dynamics
  • Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi
  • Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu Ming Yiu and Lucas C. K. Hui
  • Dismantling iClass and iClass Elite
  • Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and Milosch Meriac
  • Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms
  • Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar and Tolga Yalcin, et al.
  • Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
  • Cas Cremers and Michèle Feltz
Control code
ocn808632041
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9783642331671
Isbn Type
(electronic bk.)
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)808632041

Library Locations

    • ERDC - Hanover (US Army Engineer Research and Development Center) Borrow it
      72 Lyme Road, Hanover, NH, 03755-1290, US
      43.7279642 -72.2684934
    • ERDC - Vicksburg (US Army Engineer Research and Development Center) Borrow it
      3909 Halls Ferry Road, Vicksburg, MS, 39180-6199, US
      32.3019214 -90.8733482
Processing Feedback ...