Computer Security – ESORICS 2016

21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I

  • Askoxylakis Ioannis 
  • Ioannidis Sotiris 
  • Katsikas Sokratis 
  • Meadows Catherine 
Conference proceedings ESORICS 2016

DOI: 10.1007/978-3-319-45744-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9878)

Table of contents (30 papers)

  1. Front Matter
    Pages I-XIX
  2. Network and Web Security

    1. Front Matter
      Pages 1-1
    2. Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
      Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad
      Pages 3-26
    3. Toward an Efficient Website Fingerprinting Defense
      Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
      Pages 27-46
    4. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
      Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang et al.
      Pages 47-66
  3. Authentication

    1. Front Matter
      Pages 67-67
    2. Comparing Password Ranking Algorithms on Real-World Password Datasets
      Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari
      Pages 69-90
    3. Scalable Two-Factor Authentication Using Historical Data
      Aldar C.-F. Chan, Jun Wen Wong, Jianying Zhou, Joseph Teo
      Pages 91-110
    4. On the Implications of Zipf’s Law in Passwords
      Ding Wang, Ping Wang
      Pages 111-131
  4. Encrypted Search

    1. Front Matter
      Pages 133-133
    2. PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
      Jun Zhou, Zhenfu Cao, Xiaolei Dong
      Pages 135-153
    3. An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
      Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
      Pages 154-172
    4. Efficient Encrypted Keyword Search for Multi-user Data Sharing
      Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
      Pages 173-195
  5. Detection and Monitoring

    1. Front Matter
      Pages 197-197
    2. Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
      Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi, Levente Buttyán
      Pages 199-216
    3. Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
      Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun
      Pages 217-237
    4. A Machine Learning Approach for Detecting Third-Party Trackers on the Web
      Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen
      Pages 238-258
  6. Cryptography for Cloud Computing

    1. Front Matter
      Pages 259-259
    2. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
      Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud
      Pages 261-278
    3. Attribute-Based Signatures for Supporting Anonymous Certification
      Nesrine Kaaniche, Maryline Laurent
      Pages 279-300

Other volumes

  1. Computer Security – ESORICS 2016
    21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
  2. Computer Security – ESORICS 2016
    21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II

About these proceedings


The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.

The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.


database security e-commerce network security systems security Web security applied cryptography e-voting economics of security formal methods human aspects of security and privacy intrusion detection operating systems security privacy security in the internet of things security of cyber-physical systems security of software and applications security services societal aspects of security and privacy storage security theory of security

Editors and affiliations

  • Askoxylakis Ioannis 
    • 1
  • Ioannidis Sotiris 
    • 2
  • Katsikas Sokratis 
    • 3
  • Meadows Catherine 
    • 4
  1. 1.Institute of Computer ScienceFound for Research & Technology - HellasHeraklionGreece
  2. 2.Institute of Computer ScienceFoundation for Research and Technology - HellasHeraklionGreece
  3. 3.Norwegian Univ. of Science & Technology GjøvikNorway
  4. 4.Naval Research Laboratory WashingtonUSA

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-45743-7
  • Online ISBN 978-3-319-45744-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349