Book Volume 9878 2016

Computer Security – ESORICS 2016

21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I

ISBN: 978-3-319-45743-7 (Print) 978-3-319-45744-4 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIX

  2. Network and Web Security

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-26

      Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution

    3. No Access

      Chapter

      Pages 27-46

      Toward an Efficient Website Fingerprinting Defense

    4. No Access

      Chapter

      Pages 47-66

      Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack

  3. Authentication

    1. Front Matter

      Pages 67-67

    2. No Access

      Chapter

      Pages 69-90

      Comparing Password Ranking Algorithms on Real-World Password Datasets

    3. No Access

      Chapter

      Pages 91-110

      Scalable Two-Factor Authentication Using Historical Data

    4. No Access

      Chapter

      Pages 111-131

      On the Implications of Zipf’s Law in Passwords

  4. Encrypted Search

    1. Front Matter

      Pages 133-133

    2. No Access

      Chapter

      Pages 135-153

      PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching

    3. No Access

      Chapter

      Pages 154-172

      An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries

    4. No Access

      Chapter

      Pages 173-195

      Efficient Encrypted Keyword Search for Multi-user Data Sharing

  5. Detection and Monitoring

    1. Front Matter

      Pages 197-197

    2. No Access

      Chapter

      Pages 199-216

      Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis

    3. No Access

      Chapter

      Pages 217-237

      Mobile Application Impersonation Detection Using Dynamic User Interface Extraction

    4. No Access

      Chapter

      Pages 238-258

      A Machine Learning Approach for Detecting Third-Party Trackers on the Web

  6. Cryptography for Cloud Computing

    1. Front Matter

      Pages 259-259

    2. No Access

      Chapter

      Pages 261-278

      Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

    3. No Access

      Chapter

      Pages 279-300

      Attribute-Based Signatures for Supporting Anonymous Certification

    4. No Access

      Chapter

      Pages 301-323

      Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes

    5. No Access

      Chapter

      Pages 324-343

      Lightweight Delegatable Proofs of Storage

    6. No Access

      Chapter

      Pages 344-362

      Anonymous RAM

    7. No Access

      Chapter

      Pages 363-380

      Efficient Sanitizable Signatures Without Random Oracles

  7. Operating Systems Security

    1. Front Matter

      Pages 381-381

    2. No Access

      Chapter

      Pages 383-400

      Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook

    3. No Access

      Chapter

      Pages 401-421

      Hey, You, Get Off of My Image: Detecting Data Residue in Android Images

previous Page of 2