Book Volume 9879 2016

Computer Security – ESORICS 2016

21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II

ISBN: 978-3-319-45740-6 (Print) 978-3-319-45741-3 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIX

  2. Leakage Management and Obfuscation

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-19

      Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors

    3. No Access

      Chapter

      Pages 20-38

      More Practical and Secure History-Independent Hash Tables

    4. No Access

      Chapter

      Pages 39-58

      On Manufacturing Resilient Opaque Constructs Against Static Analysis

  3. Secure Multiparty Computation

    1. Front Matter

      Pages 59-59

    2. No Access

      Chapter

      Pages 61-79

      Robust Password-Protected Secret Sharing

    3. No Access

      Chapter

      Pages 80-98

      Compiling Low Depth Circuits for Practical Secure Computation

    4. No Access

      Chapter

      Pages 99-117

      Secure Computation of MIPS Machine Code

  4. Secure Logging

    1. Front Matter

      Pages 119-119

    2. No Access

      Chapter

      Pages 121-139

      Insynd: Improved Privacy-Preserving Transparency Logging

    3. No Access

      Chapter

      Pages 140-158

      Secure Logging Schemes and Certificate Transparency

  5. Economics of Security

    1. Front Matter

      Pages 159-159

    2. No Access

      Chapter

      Pages 161-178

      Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms

    3. No Access

      Chapter

      Pages 179-197

      Efficient Numerical Frameworks for Multi-objective Cyber Security Planning

  6. E-voting and E-commerce

    1. Front Matter

      Pages 199-199

    2. No Access

      Chapter

      Pages 201-222

      On Bitcoin Security in the Presence of Broken Cryptographic Primitives

    3. No Access

      Chapter

      Pages 223-240

      DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities

    4. No Access

      Chapter

      Pages 241-260

      When Are Three Voters Enough for Privacy Properties?

    5. No Access

      Chapter

      Pages 261-280

      Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts

  7. Security of the Internet of Things

    1. Front Matter

      Pages 281-281

    2. No Access

      Chapter

      Pages 283-300

      LeiA: A Lightweight Authentication Protocol for CAN

    3. No Access

      Chapter

      Pages 301-319

      Privacy, Discovery, and Authentication for the Internet of Things

    4. No Access

      Chapter

      Pages 320-338

      Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices

    5. No Access

      Chapter

      Pages 339-358

      Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things

  8. Data Privacy

    1. Front Matter

      Pages 359-359

    2. No Access

      Chapter

      Pages 361-381

      Information Control by Policy-Based Relational Weakening Templates

    3. No Access

      Chapter

      Pages 382-405

      Quantifying Location Privacy Leakage from Transaction Prices

previous Page of 2