Computer Security - ESORICS 2014

19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

  • Mirosław Kutyłowski
  • Jaideep Vaidya
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8712)

Table of contents

  1. John C. Mace, Charles Morisset, Aad van Moorsel
    Pages 344-361
  2. Hua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang et al.
    Pages 362-379
  3. Bharath Kumar Samanthula, Wei Jiang, Elisa Bertino
    Pages 400-418
  4. Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng
    Pages 419-435
  5. Bertram Poettering, Douglas Stebila
    Pages 436-453
  6. Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
    Pages 472-487
  7. Naveed Ahmed, Christina Pöpper, Srdjan Capkun
    Pages 488-507
  8. Tao Wang, Yao Liu, Jay Ligatti
    Pages 508-525
  9. Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu
    Pages 526-541
  10. Back Matter

Other volumes

  1. Computer Security - ESORICS 2014
    19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
  2. 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II

About these proceedings

Introduction

The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.

Keywords

anomaly detection cryptography database and storage security formal methods and theory of security human and societal aspects of security and privacy intrusion detection malware mitigation mobile devices network security security and privacy security and privacy security in hardware security services software and application security systems security

Editors and affiliations

  • Mirosław Kutyłowski
    • 1
  • Jaideep Vaidya
    • 2
  1. 1.Department of Fundamental Problems of TechnologyWrocław University of TechnologyWrocławPoland
  2. 2.MSIS DepartmentRutgers UniversityUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-11203-9
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-11202-2
  • Online ISBN 978-3-319-11203-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book