Advertisement

Computer Security – ESORICS 2019

24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II

  • Kazue Sako
  • Steve Schneider
  • Peter Y. A. Ryan
Conference proceedings ESORICS 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11736)

Also part of the Security and Cryptology book sub series (LNSC, volume 11736)

Table of contents

  1. Front Matter
    Pages i-xxvi
  2. Software Security

    1. Front Matter
      Pages 1-1
    2. Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi
      Pages 47-67
    3. Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
      Pages 68-87
    4. Nicolai Davidsson, Andre Pawlowski, Thorsten Holz
      Pages 88-109
  3. Cryptographic Protocols

    1. Front Matter
      Pages 111-111
    2. Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma
      Pages 134-150
    3. Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru et al.
      Pages 151-171
    4. Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
      Pages 172-192
  4. Security Models

    1. Front Matter
      Pages 193-193
    2. Henrique G. G. Pereira, Philip W. L. Fong
      Pages 195-216
    3. Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang
      Pages 217-238
    4. Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi et al.
      Pages 239-262
    5. Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier Lopez
      Pages 263-280
  5. Searchable Encryption

    1. Front Matter
      Pages 281-281
    2. Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
      Pages 283-303
    3. Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, Xiaofeng Chen
      Pages 304-321
    4. Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, Surya Nepal
      Pages 322-343
    5. Florian Kerschbaum, Anselme Tueno
      Pages 344-364
  6. Privacy

    1. Front Matter
      Pages 365-365
    2. Matteo Cagnazzo, Thorsten Holz, Norbert Pohlmann
      Pages 367-386
    3. Xun Yi, Kwok-Yan Lam, Elisa Bertino, Fang-Yu Rao
      Pages 387-411
    4. Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, Kun Sun
      Pages 412-438
  7. Key Exchange Protocols

    1. Front Matter
      Pages 461-461
    2. Gildas Avoine, Sébastien Canard, Loïc Ferreira
      Pages 463-483
    3. Junichi Tomida, Atsushi Fujioka, Akira Nagai, Koutarou Suzuki
      Pages 484-503
    4. Yue Qin, Chi Cheng, Jintai Ding
      Pages 504-520
    5. Jacqueline Brendel, Marc Fischlin, Felix Günther
      Pages 521-541
  8. Web Security

    1. Front Matter
      Pages 543-543
    2. Alex Belkin, Nethanel Gelernter, Israel Cidon
      Pages 545-564
    3. Stefanos Chaliasos, George Metaxopoulos, George Argyros, Dimitris Mitropoulos
      Pages 565-585
    4. Hugo Jonker, Benjamin Krumnow, Gabry Vlot
      Pages 586-605
    5. Stefano Calzavara, Alvise Rabitti, Alessio Ragazzo, Michele Bugliesi
      Pages 606-624
  9. Back Matter
    Pages 625-627

Other volumes

  1. 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I
  2. Computer Security – ESORICS 2019
    24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II

About these proceedings

Introduction

The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. 
The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:
Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.
Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.

Keywords

access control authentication computer crime computer hardware computer network computer science computer security computer systems cryptography data privacy data security distributed computer systems engineering internet network protocols network security public key cryptography security systems software design software engineering

Editors and affiliations

  1. 1.NEC CorporationKawasakiJapan
  2. 2.University of SurreyGuildfordUK
  3. 3.University of LuxembourgEsch-sur-AlzetteLuxembourg

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-29962-0
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-29961-3
  • Online ISBN 978-3-030-29962-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site