Computer Security – ESORICS 2013

18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings

Editors:

ISBN: 978-3-642-40202-9 (Print) 978-3-642-40203-6 (Online)

Table of contents (43 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Cryptography and Computation

    1. No Access

      Book Chapter

      Pages 1-18

      Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits

    2. No Access

      Book Chapter

      Pages 19-37

      Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn

    3. No Access

      Book Chapter

      Pages 38-56

      Privacy-Preserving Accountable Computation

  3. Measurement and Evaluation

    1. No Access

      Book Chapter

      Pages 57-74

      Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode

    2. No Access

      Book Chapter

      Pages 75-93

      A Quantitative Evaluation of Privilege Separation in Web Browser Designs

    3. No Access

      Book Chapter

      Pages 94-110

      Estimating Asset Sensitivity by Profiling Users

  4. Applications of Cryptography

    1. No Access

      Book Chapter

      Pages 111-128

      Practical Secure Logging: Seekable Sequential Key Generators

    2. No Access

      Book Chapter

      Pages 129-146

      Request-Based Comparable Encryption

    3. No Access

      Book Chapter

      Pages 147-163

      Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud

  5. Code Analysis

    1. No Access

      Book Chapter

      Pages 164-181

      HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism

    2. No Access

      Book Chapter

      Pages 182-199

      AnDarwin: Scalable Detection of Semantically Similar Android Applications

    3. No Access

      Book Chapter

      Pages 200-218

      BISTRO: Binary Component Extraction and Embedding for Software Security Applications

  6. Network Security

    1. No Access

      Book Chapter

      Pages 219-236

      Vulnerable Delegation of DNS Resolution

    2. No Access

      Book Chapter

      Pages 237-254

      Formal Approach for Route Agility against Persistent Attackers

    3. No Access

      Book Chapter

      Pages 255-272

      Plug-and-Play IP Security

  7. Formal Models and Methods

    1. No Access

      Book Chapter

      Pages 273-290

      Managing the Weakest Link

    2. No Access

      Book Chapter

      Pages 291-308

      Automated Security Proofs for Almost-Universal Hash for MAC Verification

    3. No Access

      Book Chapter

      Pages 309-326

      Bounded Memory Protocols and Progressing Collaborative Systems

    4. No Access

      Book Chapter

      Pages 327-344

      Universally Composable Key-Management

  8. Protocol Analysis

    1. No Access

      Book Chapter

      Pages 345-362

      A Cryptographic Analysis of OPACITY

previous Page of 3