Computer Security - ESORICS 2008

13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

  • Sushil Jajodia
  • Javier Lopez

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5283)

Table of contents

  1. Front Matter
  2. Session 1: Intrusion Detection and Network Vulnerability Analysis

    1. Reginald E. Sawilla, Xinming Ou
      Pages 18-34
    2. C. P. Mu, X. J. Li, H. K. Huang, S. F. Tian
      Pages 35-48
  3. Session 2: Network Security

    1. Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
      Pages 49-65
    2. Gelareh Taban, Virgil D. Gligor
      Pages 66-81
    3. Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu
      Pages 82-96
  4. Session 3: Smart Cards and Identity Management

    1. Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur et al.
      Pages 97-114
    2. Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
      Pages 115-129
  5. Session 4: Data and Applications Security

  6. Session 5: Privacy Enhancing Technologies

    1. Dan Bogdanov, Sven Laur, Jan Willemson
      Pages 192-206
    2. Athanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis N. Katsikas
      Pages 207-222
    3. Ee-Chien Chang, Jia Xu
      Pages 223-237
  7. Session 6: Anonymity and RFID Privacy

    1. J. P. Muñoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, J. C. Sanchez-Aarnoutse, J. Garcia-Haro
      Pages 238-250
    2. Ching Yu Ng, Willy Susilo, Yi Mu, Rei Safavi-Naini
      Pages 251-266
    3. JungHoon Ha, SangJae Moon, Jianying Zhou, JaeCheol Ha
      Pages 267-281
  8. Session 7: Access Control and Trust Negotiation

    1. Charles C. Zhang, Marianne Winslett
      Pages 282-299

About these proceedings


This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, held in Torremolinos, Spain, in October 2008.

The 37 revised full papers presented were carefully reviewed and selected from 168 submissions. The papers are organized in topical sections on Intrusion Detection and Network Vulnerability Analysis; Network Security; Smart Cards and Identity management; Data and Applications Security; Privacy Enhancing Technologies; Anonymity and RFID Privacy; Access Control and Trust Negotiation; Information Flow and Non-transferability; Secure Electronic Voting and Web Applications Security; VoIP Security, Malware, and DRM; Formal Models and Cryptographic Protocols; Language-based and Hardware Security.


anonymity authorization cluster critical attack firewall identity identity management integrity check kerberos peer-to-peer privacy protocol analyzer risk management security trust

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Javier Lopez
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Department of Computer ScienceUniversity of MalagaMálagaSpain

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-88312-8
  • Online ISBN 978-3-540-88313-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book