Advertisement

Computer Security – ESORICS 2010

15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

  • Dimitris Gritzalis
  • Bart Preneel
  • Marianthi Theoharidou

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6345)

Table of contents

  1. Front Matter
  2. RFID and Privacy

    1. Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
      Pages 1-18
    2. Rishab Nithyanand, Gene Tsudik, Ersin Uzun
      Pages 19-36
    3. Elli Androulaki, Binh Vo, Steven Bellovin
      Pages 37-54
    4. Morten Dahl, Stéphanie Delaune, Graham Steel
      Pages 55-70
  3. Software Security

    1. Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou
      Pages 71-86
    2. Jay Ligatti, Srikar Reddy
      Pages 87-100
    3. Laurent Hubert, Thomas Jensen, Vincent Monfort, David Pichardie
      Pages 101-115
    4. Heiko Mantel, Henning Sudbrock
      Pages 116-133
  4. Cryptographic Protocols

    1. Octavian Catrina, Sebastiaan de Hoogh
      Pages 134-150
    2. José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 151-167
    3. Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
      Pages 168-181
    4. Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert
      Pages 182-198
  5. Traffic Analysis

    1. Liming Lu, Ee-Chien Chang, Mun Choon Chan
      Pages 199-214
    2. Artur Janc, Lukasz Olejnik
      Pages 215-231
    3. Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee
      Pages 232-248
    4. Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis
      Pages 249-267
  6. End-User Security

    1. Guang Xiang, Bryan A. Pendleton, Jason Hong, Carolyn P. Rose
      Pages 268-285
    2. Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh
      Pages 286-302
  7. Formal Analysis

    1. Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago
      Pages 303-318
    2. Tien Tuan Anh Dinh, Mark Ryan
      Pages 319-339
    3. Hirotoshi Yasuoka, Tachio Terauchi
      Pages 357-372
  8. E-voting and Broadcast

    1. Sven Heiberg, Helger Lipmaa, Filip van Laenen
      Pages 373-388
    2. Steve Kremer, Mark Ryan, Ben Smyth
      Pages 389-404
    3. James Heather, Peter Y. A. Ryan, Vanessa Teague
      Pages 405-423
    4. Marina Blanton, Keith B. Frikken
      Pages 424-440
  9. Authentication, Access Control, Authorization and Attestation

    1. Jan Meier, Dieter Gollmann
      Pages 441-454
    2. Mikhail I. Gofman, Ruiqi Luo, Ping Yang
      Pages 455-471
    3. Jason Crampton, Michael Huth
      Pages 472-487
    4. Alptekin Küpçü, Anna Lysyanskaya
      Pages 488-507
  10. Anonymity and Unlinkability

    1. Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf
      Pages 508-523
    2. Andreas Pashalidis, Stefan Schiffner
      Pages 524-539
    3. Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou
      Pages 540-557
    4. Ferucio Laurenţiu Ţiplea, Loredana Vamanu, Cosmin Vârlan
      Pages 558-572
  11. Network Security and Economics

    1. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
      Pages 573-587
    2. Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang
      Pages 588-606
    3. Michael Backes, Oana Ciobotaru, Anton Krohmer
      Pages 607-625
    4. Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar
      Pages 626-642
  12. Secure Update, DOS and Intrustion Detection

    1. Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos
      Pages 663-678
    2. Ghassan O. Karame, Srdjan Čapkun
      Pages 679-697
    3. Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh
      Pages 698-715
  13. Back Matter

About these proceedings

Introduction

The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was also organized to arrive at the ?nal decision. As a result of the review process, 42 papers were selected for the ?nal program, resulting in an - ceptance rate of as low as 21%. The authors of accepted papers were requested to revise their papers, based on the comments received. The program was c- pleted with an invited talk by Udo Helmbrecht, Executive Director of ENISA (European Network and Information Security Agency). ESORICS 2010 was organized under the aegisof three Ministries of the G- ernment of Greece, namely: (a) the Ministry of Infrastructure, Transport, and Networks, (b) the General Secretariat for Information Systems of the Ministry of Economy and Finance, and (c) the General Secretariat for e-Governance of the Ministry of Interior, Decentralization, and e-Government.

Keywords

access control anonymity authorization e-voting intrusion detection privacy security trust

Editors and affiliations

  • Dimitris Gritzalis
    • 1
  • Bart Preneel
    • 2
  • Marianthi Theoharidou
    • 1
  1. 1.Information Security and Critical Infrastructure Protection Research Group, Dept. of InformaticsAthens University of Economics and BusinessAthensGreece
  2. 2.Dept. Electrical Engineering-ESAT/COSICKatholieke Universiteit LeuvenLeuvenBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-15497-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-15496-6
  • Online ISBN 978-3-642-15497-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site