Advertisement

Computer Security -- ESORICS 2015

20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I

  • Günther Pernul
  • Peter Y A Ryan
  • Edgar Weippl

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9326)

Also part of the Security and Cryptology book sub series (LNSC, volume 9326)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Networks and Web Security

    1. Front Matter
      Pages 1-1
    2. Haya Shulman, Michael Waidner
      Pages 3-22
    3. Mario Heiderich, Marcus Niemietz, Jörg Schwenk
      Pages 23-42
  3. System Security

    1. Front Matter
      Pages 67-67
    2. Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu
      Pages 69-89
    3. Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam, Patrik Ekdahl
      Pages 90-107
    4. Daniel Gruss, David Bidner, Stefan Mangard
      Pages 108-122
  4. Cryptography

    1. Front Matter
      Pages 123-123
    2. Michael Backes, Esfandiar Mohammadi, Tim Ruffing
      Pages 125-145
    3. Christian Hanser, Max Rabkin, Dominique Schröder
      Pages 146-164
    4. Gildas Avoine, Xavier Carpent, Cédric Lauradoux
      Pages 165-184
    5. Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu
      Pages 203-223
    6. Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
      Pages 224-242
    7. Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
      Pages 243-265
    8. Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu
      Pages 266-285
    9. Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu
      Pages 286-304
    10. Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
      Pages 305-325
    11. Aggelos Kiayias, Qiang Tang
      Pages 326-346
    12. Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu
      Pages 347-365
    13. Swee-Won Lo, Zhuo Wei, Robert H. Deng, Xuhua Ding
      Pages 366-383
    14. Tibor Jager, Jörg Schwenk, Juraj Somorovsky
      Pages 407-425
  5. Crypto Applications and Attacks

    1. Front Matter
      Pages 427-427
    2. Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, Stefano Sanfilippo
      Pages 429-446
    3. Heiko Mantel, Artem Starostin
      Pages 447-467
    4. Junrong Liu, Yu Yu, François-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun et al.
      Pages 468-480
  6. Risk Analysis

    1. Front Matter
      Pages 481-481
    2. Aron Laszka, Jens Grossklags
      Pages 483-502
    3. Jan Tobias Mühlberg, Job Noorman, Frank Piessens
      Pages 503-520
    4. Paul Beaumont, Neil Evans, Michael Huth, Tom Plant
      Pages 521-540
  7. Back Matter
    Pages 541-543

Other volumes

  1. Computer Security -- ESORICS 2015
    20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I
  2. 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II

About these proceedings

Introduction

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.

The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.    

Keywords

Applied security Cloud security Cryptography Networks & web security Risk analysis Authentication Cloud computing Code analysis & side-channels Crypto applications & attacks Detection & monitoring Distributed algorithms Internet of things Malware detection Password cracking Policies Privacy Protocols & attribute-based encryption Public-key encryption Social networks System security

Editors and affiliations

  • Günther Pernul
    • 1
  • Peter Y A Ryan
    • 2
  • Edgar Weippl
    • 3
  1. 1.University of RegensburgRegensburgGermany
  2. 2.University of LuxembourgLuxembourgLuxembourg
  3. 3.SBA ResearchWienAustria

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-24174-6
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-24173-9
  • Online ISBN 978-3-319-24174-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site