Skip to main content
  • Conference proceedings
  • © 2016

Computer Security – ESORICS 2016

21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9878)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2016.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-45744-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (30 papers)

  1. Front Matter

    Pages I-XIX
  2. Network and Web Security

    1. Front Matter

      Pages 1-1
    2. Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution

      • Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad
      Pages 3-26
    3. Toward an Efficient Website Fingerprinting Defense

      • Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
      Pages 27-46
    4. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack

      • Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang et al.
      Pages 47-66
  3. Authentication

    1. Front Matter

      Pages 67-67
    2. Comparing Password Ranking Algorithms on Real-World Password Datasets

      • Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari
      Pages 69-90
    3. Scalable Two-Factor Authentication Using Historical Data

      • Aldar C.-F. Chan, Jun Wen Wong, Jianying Zhou, Joseph Teo
      Pages 91-110
    4. On the Implications of Zipf’s Law in Passwords

      • Ding Wang, Ping Wang
      Pages 111-131
  4. Encrypted Search

    1. Front Matter

      Pages 133-133
    2. PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching

      • Jun Zhou, Zhenfu Cao, Xiaolei Dong
      Pages 135-153
    3. An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries

      • Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
      Pages 154-172
    4. Efficient Encrypted Keyword Search for Multi-user Data Sharing

      • Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
      Pages 173-195
  5. Detection and Monitoring

    1. Front Matter

      Pages 197-197
    2. Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis

      • Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi, Levente Buttyán
      Pages 199-216
    3. Mobile Application Impersonation Detection Using Dynamic User Interface Extraction

      • Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun
      Pages 217-237
    4. A Machine Learning Approach for Detecting Third-Party Trackers on the Web

      • Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen
      Pages 238-258
  6. Cryptography for Cloud Computing

    1. Front Matter

      Pages 259-259
    2. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

      • Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud
      Pages 261-278
    3. Attribute-Based Signatures for Supporting Anonymous Certification

      • Nesrine Kaaniche, Maryline Laurent
      Pages 279-300

Other Volumes

  1. Computer Security – ESORICS 2016

    21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
  2. Computer Security – ESORICS 2016

    21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II

About this book

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.

The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.

Keywords

  • database security
  • e-commerce
  • network security
  • systems security
  • Web security
  • applied cryptography
  • e-voting
  • economics of security
  • formal methods
  • human aspects of security and privacy
  • intrusion detection
  • operating systems security
  • privacy
  • security in the internet of things
  • security of cyber-physical systems
  • security of software and applications
  • security services
  • societal aspects of security and privacy
  • storage security
  • theory of security

Editors and Affiliations

  • Institute of Computer Science, Found for Research & Technology - Hellas, Heraklion, Greece

    Ioannis Askoxylakis

  • Institute of Computer Science, Foundation for Research and Technology - Hellas, Heraklion, Greece

    Sotiris Ioannidis

  • Norwegian Univ. of Science & Technology , Gjøvik, Norway

    Sokratis Katsikas

  • Naval Research Laboratory , Washington, USA

    Catherine Meadows

Bibliographic Information

  • Book Title: Computer Security – ESORICS 2016

  • Book Subtitle: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I

  • Editors: Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-45744-4

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2016

  • Softcover ISBN: 978-3-319-45743-7

  • eBook ISBN: 978-3-319-45744-4

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIX, 623

  • Number of Illustrations: 153 b/w illustrations

  • Topics: Data and Information Security, Cryptology, IT Operations, Algorithms, Computers and Society

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-45744-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)