Advertisement

Computer Security – ESORICS 2012

17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings

  • Sara Foresti
  • Moti Yung
  • Fabio Martinelli

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7459)

Table of contents

  1. Front Matter
  2. Security and Data Protection in Real Systems

    1. Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
      Pages 1-18
    2. James Kelley, Roberto Tamassia, Nikos Triandopoulos
      Pages 19-36
    3. Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 37-54
    4. Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld
      Pages 55-72
  3. Formal Models for Cryptography and Access Control

    1. Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows et al.
      Pages 73-90
    2. Sebastian Mödersheim
      Pages 127-144
  4. Security and Privacy in Mobile and Wireless Networks

    1. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian
      Pages 145-162
    2. Ruben Rios, Jorge Cuellar, Javier Lopez
      Pages 163-180
    3. Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
      Pages 181-198
  5. Counteracting Man-in-the-Middle Attacks

    1. Italo Dacosta, Mustaque Ahamad, Patrick Traynor
      Pages 199-216
    2. Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle
      Pages 217-234
    3. Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic
      Pages 235-252
  6. Network Security

    1. Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
      Pages 253-270
    2. Amir Herzberg, Haya Shulman
      Pages 271-288
  7. Users Privacy and Anonymity

    1. Mishari Almishari, Gene Tsudik
      Pages 307-324
    2. Naipeng Dong, Hugo Jonker, Jun Pang
      Pages 325-342
    3. Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi
      Pages 343-360
  8. Location Privacy

    1. Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou
      Pages 361-378
    2. Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
      Pages 379-396
    3. Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
      Pages 397-414
    4. Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Škorić, Dave Singelée, Srdjan Čapkun
      Pages 415-432
  9. Voting Protocols and Anonymous Communication

    1. Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech
      Pages 451-468
    2. Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
      Pages 469-486
    3. Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
      Pages 487-504
  10. Private Computation in Cloud Systems

    1. Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah Malluhi
      Pages 505-522
    2. Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou
      Pages 541-556
  11. Formal Security Models

    1. Naveed Ahmed, Christian D. Jensen, Erik Zenner
      Pages 557-572
    2. Charanjit S. Jutla, Arnab Roy
      Pages 573-590
  12. Identity Based Encryption and Group Signature

    1. Matthew Franklin, Haibin Zhang
      Pages 643-660
  13. Authentication

    1. Daisuke Moriyama, Shin’ichiro Matsuo, Miyako Ohkubo
      Pages 661-678
    2. Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu Ming Yiu, Lucas C. K. Hui
      Pages 679-696
    3. Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac
      Pages 697-715
  14. Encryption Key and Password Security

    1. Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalcin, Ralf Zimmermann
      Pages 716-733
    2. Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
      Pages 752-769
    3. Paolo Gasti, Kasper B. Rasmussen
      Pages 770-787
  15. Malware and Phishing

    1. Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu et al.
      Pages 788-805
    2. Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion
      Pages 806-823
    3. Rakesh Verma, Narasimha Shashidhar, Nabil Hossain
      Pages 824-841
  16. Software Security

    1. Mengtao Sun, Gang Tan
      Pages 842-858
    2. Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang
      Pages 859-876

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Keywords

Android authentication protocols cloud computing security and privacy wireless networks

Editors and affiliations

  • Sara Foresti
    • 1
  • Moti Yung
    • 2
  • Fabio Martinelli
    • 3
  1. 1.Dipartimento di InformaticaUniversità degli Studi di MilanoCremaItaly
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUS
  3. 3.Institute of Informatics and Telematics, Information Security GroupNational Research CouncilPisaItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-33167-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-33166-4
  • Online ISBN 978-3-642-33167-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site