Skip to main content
  • Conference proceedings
  • © 2015

Computer Security -- ESORICS 2015

20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I

Editors:

(view affiliations)

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9326)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2015.

Buying options

eBook
USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-24174-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 89.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (27 papers)

  1. Front Matter

    Pages I-XVIII
  2. Networks and Web Security

    1. Front Matter

      Pages 1-1
    2. Towards Security of Internet Naming Infrastructure

      • Haya Shulman, Michael Waidner
      Pages 3-22
    3. Waiting for CSP – Securing Legacy Web Applications with JSAgents

      • Mario Heiderich, Marcus Niemietz, Jörg Schwenk
      Pages 23-42
  3. System Security

    1. Front Matter

      Pages 67-67
    2. A Practical Approach for Adaptive Data Structure Layout Randomization

      • Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu
      Pages 69-89
    3. Trustworthy Prevention of Code Injection in Linux on Embedded Devices

      • Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam, Patrik Ekdahl
      Pages 90-107
    4. Practical Memory Deduplication Attacks in Sandboxed Javascript

      • Daniel Gruss, David Bidner, Stefan Mangard
      Pages 108-122
  4. Cryptography

    1. Front Matter

      Pages 123-123
    2. Computational Soundness for Interactive Primitives

      • Michael Backes, Esfandiar Mohammadi, Tim Ruffing
      Pages 125-145
    3. Verifiably Encrypted Signatures: Security Revisited and a New Construction

      • Christian Hanser, Max Rabkin, Dominique Schröder
      Pages 146-164
    4. Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions

      • Gildas Avoine, Xavier Carpent, Cédric Lauradoux
      Pages 165-184
    5. Symmetric-Key Based Proofs of Retrievability Supporting Public Verification

      • Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu
      Pages 203-223
    6. DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead

      • Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
      Pages 224-242
    7. Short Accountable Ring Signatures Based on DDH

      • Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
      Pages 243-265
    8. Updatable Hash Proof System and Its Applications

      • Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu
      Pages 266-285
    9. Server-Aided Revocable Identity-Based Encryption

      • Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu
      Pages 286-304
    10. Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings

      • Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
      Pages 305-325

Other Volumes

  1. Computer Security -- ESORICS 2015

    20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I

About this book

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.

The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.    

Keywords

  • Applied security
  • Cloud security
  • Cryptography
  • Networks & web security
  • Risk analysis
  • Authentication
  • Cloud computing
  • Code analysis & side-channels
  • Crypto applications & attacks
  • Detection & monitoring
  • Distributed algorithms
  • Internet of things
  • Malware detection
  • Password cracking
  • Policies
  • Privacy
  • Protocols & attribute-based encryption
  • Public-key encryption
  • Social networks
  • System security

Editors and Affiliations

  • University of Regensburg, Regensburg, Germany

    Günther Pernul

  • University of Luxembourg, Luxembourg, Luxembourg

    Peter Y A Ryan

  • SBA Research, Wien, Austria

    Edgar Weippl

About the editors

   

Bibliographic Information

  • Book Title: Computer Security -- ESORICS 2015

  • Book Subtitle: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I

  • Editors: Günther Pernul, Peter Y A Ryan, Edgar Weippl

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-24174-6

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2015

  • Softcover ISBN: 978-3-319-24173-9

  • eBook ISBN: 978-3-319-24174-6

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVIII, 543

  • Number of Illustrations: 114 illustrations in colour

  • Topics: Data and Information Security, Cryptology, IT Operations, Algorithms, Computers and Society

Buying options

eBook
USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-24174-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 89.99
Price excludes VAT (USA)