Cargando…

Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings /

The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Gritzalis, Dimitris (Editor ), Preneel, Bart (Editor ), Theoharidou, Marianthi (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6345
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • RFID and Privacy
  • A New Framework for RFID Privacy
  • Readers Behaving Badly
  • Privacy-Preserving, Taxable Bank Accounts
  • Formal Analysis of Privacy for Vehicular Mix-Zones
  • Software Security
  • IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time
  • A Theory of Runtime Enforcement, with Results
  • Enforcing Secure Object Initialization in Java
  • Flexible Scheduler-Independent Security
  • Cryptographic Protocols
  • Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
  • A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ?-Protocols
  • Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model
  • DR@FT: Efficient Remote Attestation Framework for Dynamic Systems
  • Traffic Analysis
  • Website Fingerprinting and Identification Using Ordered Feature Sequences
  • Web Browser History Detection as a Real-World Privacy Threat
  • On the Secrecy of Spread-Spectrum Flow Watermarks
  • Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
  • End-User Security
  • A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection
  • Kamouflage: Loss-Resistant Password Management
  • Formal Analysis
  • Sequential Protocol Composition in Maude-NPA
  • Verifying Security Property of Peer-to-Peer Systems Using CSP
  • Modeling and Analyzing Security in the Presence of Compromising Adversaries
  • On Bounding Problems of Quantitative Information Flow
  • E-voting and Broadcast
  • On E-Vote Integrity in the Case of Malicious Voter Computers
  • Election Verifiability in Electronic Voting Protocols
  • Pretty Good Democracy for More Expressive Voting Schemes
  • Efficient Multi-dimensional Key Management in Broadcast Services
  • Authentication, Access Control, Authorization and Attestation
  • Caught in the Maze of Security Standards
  • User-Role Reachability Analysis of Evolving Administrative Role Based Access Control
  • An Authorization Framework Resilient to Policy Evaluation Failures
  • Optimistic Fair Exchange with Multiple Arbiters
  • Anonymity and Unlinkability
  • Speaker Recognition in Encrypted Voice Streams
  • Evaluating Adversarial Partitions
  • Providing Mobile Users' Anonymity in Hybrid Networks
  • Complexity of Anonymity for Security Protocols
  • Network Security and Economics
  • k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
  • Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information
  • RatFish: A File Sharing Protocol Provably Secure against Rational Users
  • A Service Dependency Model for Cost-Sensitive Intrusion Response
  • Secure Update, DOS and Intrustion Detection
  • Secure Code Update for Embedded Devices via Proofs of Secure Erasure
  • D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
  • Low-Cost Client Puzzles Based on Modular Exponentiation
  • Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.