Table of contents

  1. Front Matter
  2. Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William Horne
    Pages 1-18
  3. Nektarios Leontiadis, Nicolas Christin
    Pages 19-36
  4. Dominik Herrmann, Karl-Peter Fuchs, Jens Lindemann, Hannes Federrath
    Pages 37-55
  5. Mark Simkin, Dominique Schröder, Andreas Bulling, Mario Fritz
    Pages 56-75
  6. Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter
    Pages 76-93
  7. Diogo Mónica, Carlos Ribeiro
    Pages 94-111
  8. Liang Feng Zhang, Reihaneh Safavi-Naini
    Pages 112-129
  9. Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou
    Pages 148-162
  10. Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip Porras
    Pages 163-182
  11. Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez
    Pages 183-201
  12. He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia
    Pages 202-218
  13. Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
    Pages 219-238
  14. Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen
    Pages 239-256
  15. Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
    Pages 257-272
  16. Junzuo Lai, Robert H. Deng, Hweehwa Pang, Jian Weng
    Pages 273-291
  17. Gang Xu, George T. Amariucai, Yong Guan
    Pages 292-309
  18. Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai
    Pages 310-325
  19. Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu et al.
    Pages 326-343

Other volumes

  1. Computer Security - ESORICS 2014
    19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
  2. 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II

About these proceedings


The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.


anomaly detection cryptography database and storage security formal methods and theory of security human and societal aspects of security and privacy intrusion detection malware mitigation mobile devices network security security and privacy security and privacy security in hardware security services software and application security systems security

Editors and affiliations

  • Mirosław Kutyłowski
    • 1
  • Jaideep Vaidya
    • 2
  1. 1.Department of Fundamental Problems of TechnologyWrocław University of TechnologyWrocławPoland
  2. 2.MSIS DepartmentRutgers UniversityUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-11202-2
  • Online ISBN 978-3-319-11203-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book