Advertisement

Computer Security

23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I

  • Javier Lopez
  • Jianying Zhou
  • Miguel Soriano
Conference proceedings ESORICS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11098)

Also part of the Security and Cryptology book sub series (LNSC, volume 11098)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Software Security

    1. Front Matter
      Pages 1-1
    2. Paul Muntean, Sebastian Wuerl, Jens Grossklags, Claudia Eckert
      Pages 3-25
    3. Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna
      Pages 26-47
    4. Narges Khakpour, Charilaos Skandylas
      Pages 48-65
    5. Yibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin, Kang Li
      Pages 66-83
  3. Blockchain and Machine Learning

    1. Front Matter
      Pages 85-85
    2. Erik-Oliver Blass, Florian Kerschbaum
      Pages 87-110
    3. Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias
      Pages 111-131
    4. Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan
      Pages 132-151
    5. Julien Keuffer, Refik Molva, Hervé Chabanne
      Pages 152-171
  4. Hardware Security

    1. Front Matter
      Pages 173-173
    2. Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber
      Pages 218-239
  5. Attacks

    1. Front Matter
      Pages 241-241
    2. Qian Cui, Guy-Vincent Jourdan, Gregor V. Bochmann, Iosif-Viorel Onut, Jason Flood
      Pages 243-262
    3. Kiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain et al.
      Pages 263-280
    4. Erisa Karafili, Matteo Cristani, Luca Viganò
      Pages 281-301
  6. Malware and Vulnerabilities

    1. Front Matter
      Pages 303-303
    2. Jan Van den Herrewegen, Flavio D. Garcia
      Pages 305-324
    3. Chris McMahon Stone, Tom Chothia, Joeri de Ruiter
      Pages 325-345
    4. George Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, Dimitris Gritzalis
      Pages 346-362
    5. Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, Thomas Kittel
      Pages 363-382
  7. Protocol Security

    1. Front Matter
      Pages 383-383
    2. David Baelde, Stéphanie Delaune, Lucca Hirschi
      Pages 385-405
    3. Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua
      Pages 406-426
    4. Andreas V. Hess, Sebastian A. Mödersheim, Achim D. Brucker
      Pages 427-446
  8. Privacy (I)

    1. Front Matter
      Pages 447-447
    2. Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann
      Pages 449-469
    3. Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer
      Pages 470-490
    4. Véronique Cortier, Antoine Dallon, Stéphanie Delaune
      Pages 491-511
    5. Katharina Kohls, Christina Pöpper
      Pages 512-530
  9. CPS and IoT Security

    1. Front Matter
      Pages 531-531
    2. Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada et al.
      Pages 533-554
    3. Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang
      Pages 555-574
    4. Lei Yang, Chris Seasholtz, Bo Luo, Fengjun Li
      Pages 575-594
    5. Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter
      Pages 595-617
  10. Back Matter
    Pages 619-621

Other volumes

  1. Computer Security
    23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
  2. 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II

About these proceedings

Introduction

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.

The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 

Keywords

authentication cloud computing computer crime computer networks computer systems cryptography data communication systems data mining data privacy data security electronic document identification systems encryption internet privacy public key cryptography semantics software engineering software evaluation telecommunication networks web services

Editors and affiliations

  • Javier Lopez
    • 1
  • Jianying Zhou
    • 2
  • Miguel Soriano
    • 3
  1. 1.Department of Computer ScienceUniversity of MalagaMálagaSpain
  2. 2.Singapore University of Technology and DesignSingaporeSingapore
  3. 3.Universitat Politècnica de CatalunyaBarcelonaSpain

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-99073-6
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-99072-9
  • Online ISBN 978-3-319-99073-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site