Computer Security – ESORICS 2016

21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II

  • Askoxylakis Ioannis 
  • Ioannidis Sotiris 
  • Katsikas Sokratis 
  • Meadows Catherine 
Conference proceedings ESORICS 2016

DOI: 10.1007/978-3-319-45741-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9879)

Table of contents (30 papers)

  1. Front Matter
    Pages I-XIX
  2. Leakage Management and Obfuscation

    1. Front Matter
      Pages 1-1
    2. Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors
      Andreas Zankl, Katja Miller, Johann Heyszl, Georg Sigl
      Pages 3-19
    3. More Practical and Secure History-Independent Hash Tables
      Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
      Pages 20-38
  3. Secure Multiparty Computation

    1. Front Matter
      Pages 59-59
    2. Robust Password-Protected Secret Sharing
      Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval
      Pages 61-79
    3. Compiling Low Depth Circuits for Practical Secure Computation
      Niklas Buescher, Andreas Holzer, Alina Weber, Stefan Katzenbeisser
      Pages 80-98
    4. Secure Computation of MIPS Machine Code
      Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz
      Pages 99-117
  4. Secure Logging

    1. Front Matter
      Pages 119-119
    2. Insynd: Improved Privacy-Preserving Transparency Logging
      Roel Peeters, Tobias Pulls
      Pages 121-139
    3. Secure Logging Schemes and Certificate Transparency
      Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
      Pages 140-158
  5. Economics of Security

    1. Front Matter
      Pages 159-159
    2. Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
      Aron Laszka, Mingyi Zhao, Jens Grossklags
      Pages 161-178
    3. Efficient Numerical Frameworks for Multi-objective Cyber Security Planning
      MHR. Khouzani, P. Malacaria, C. Hankin, A. Fielder, F. Smeraldi
      Pages 179-197
  6. E-voting and E-commerce

    1. Front Matter
      Pages 199-199
    2. On Bitcoin Security in the Presence of Broken Cryptographic Primitives
      Ilias Giechaskiel, Cas Cremers, Kasper B. Rasmussen
      Pages 201-222
    3. DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities
      Siamak F. Shahandashti, Feng Hao
      Pages 223-240
    4. When Are Three Voters Enough for Privacy Properties?
      Myrto Arapinis, Véronique Cortier, Steve Kremer
      Pages 241-260
    5. Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
      Wacław Banasik, Stefan Dziembowski, Daniel Malinowski
      Pages 261-280

Other volumes

  1. Computer Security – ESORICS 2016
    21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
  2. Computer Security – ESORICS 2016
    21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.

The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.

Keywords

database security e-commerce network security systems security Web security applied cryptography e-voting economics of security formal methods human aspects of security and privacy intrusion detection operating systems security privacy security in the internet of things security of cyber-physical systems security of software and applications security services societal aspects of security and privacy storage security

Editors and affiliations

  • Askoxylakis Ioannis 
    • 1
  • Ioannidis Sotiris 
    • 2
  • Katsikas Sokratis 
    • 3
  • Meadows Catherine 
    • 4
  1. 1.Institute of Computer ScienceFound for Research & Technology - Hellas Institute of Computer ScienceHeraklion, CreteGreece
  2. 2.Technology - HellasFoundation for Research and Technology - HellasHeraklionGreece
  3. 3.Norwegian Univ. of Science & Technology GjøvikNorway
  4. 4.Naval Research Laboratory WashingtonUSA

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-45740-6
  • Online ISBN 978-3-319-45741-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349