Computer Security – ESORICS 2013

18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings

  • Jason Crampton
  • Sushil Jajodia
  • Keith Mayes
Conference proceedings ESORICS 2013

DOI: 10.1007/978-3-642-40203-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8134)

Table of contents

  1. Front Matter
  2. Cryptography and Computation

    1. Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
      Pages 1-18
    2. Jan Camenisch, Robert R. Enderlein, Victor Shoup
      Pages 19-37
    3. Michael Backes, Dario Fiore, Esfandiar Mohammadi
      Pages 38-56
  3. Measurement and Evaluation

    1. Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi
      Pages 57-74
    2. Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang
      Pages 75-93
    3. Youngja Park, Christopher Gates, Stephen C. Gates
      Pages 94-110
  4. Applications of Cryptography

    1. Giorgia Azzurra Marson, Bertram Poettering
      Pages 111-128
    2. Jun Furukawa
      Pages 129-146
  5. Code Analysis

    1. Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song
      Pages 164-181
    2. Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 182-199
  6. Network Security

    1. Amir Herzberg, Haya Shulman
      Pages 219-236
    2. Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan
      Pages 237-254
    3. Yossi Gilad, Amir Herzberg
      Pages 255-272
  7. Formal Models and Methods

    1. Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
      Pages 273-290
    2. Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
      Pages 291-308
    3. Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov
      Pages 309-326
    4. Steve Kremer, Robert Künnemann, Graham Steel
      Pages 327-344

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.
The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

Keywords

attacks cryptography mobile devices privacy preservation web browsers

Editors and affiliations

  • Jason Crampton
    • 1
  • Sushil Jajodia
    • 2
  • Keith Mayes
    • 1
  1. 1.Information Security GroupUniversity of London, Royal HollowayEgham HillUK
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40202-9
  • Online ISBN 978-3-642-40203-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349