Computer Security – ESORICS 2011

16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings

  • Vijay Atluri
  • Claudia Diaz
Conference proceedings ESORICS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6879)

Table of contents

  1. Front Matter
  2. Wireless Security

    1. Nashad A. Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi
      Pages 1-20
    2. Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
      Pages 40-59
  3. Web Security I

    1. Yuchen Zhou, David Evans
      Pages 60-79
    2. Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens
      Pages 100-116
  4. Web Security II

    1. Elie Bursztein, Baptiste Gourdin, John C. Mitchell
      Pages 133-149
    2. Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Richard Shin, Dawn Song
      Pages 150-171
  5. Forensics, Biometrics and Software Protection

    1. Nathan Rosenblum, Xiaojin Zhu, Barton P. Miller
      Pages 172-189
    2. Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
      Pages 210-226
    3. Yueqiang Cheng, Xuhua Ding, Robert H. Deng
      Pages 227-244
  6. Access Control

    1. Steve Barker, Valerio Genovese
      Pages 262-277
    2. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen
      Pages 278-297
  7. Cryptography and Protocol Analysis

    1. Dominique Schröder
      Pages 298-314
    2. David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
      Pages 335-354

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers included in the book were carefully reviewed and selected from 155 papers. The articles are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; cryptography and protocol analysis; information flow, side channels, and vulnerability analysis; usability, trust, and economics of security and privacy; and privacy.

Keywords

anonymity elliptic curve cryptography malware analysis sandbox software obfuscation

Editors and affiliations

  • Vijay Atluri
    • 1
  • Claudia Diaz
    • 2
  1. 1.MSIS Department and CIMICRutgers UniversityNewarkUSA
  2. 2.K.U. Leuven ESAT-COSICLeuven-HeverleeBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-23822-2
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-23821-5
  • Online ISBN 978-3-642-23822-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book