© 2012

Computer Security – ESORICS 2012

17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings

  • Sara Foresti
  • Moti Yung
  • Fabio Martinelli
Conference proceedings ESORICS 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7459)

Table of contents

  1. Front Matter
  2. Security and Data Protection in Real Systems

    1. Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
      Pages 1-18
    2. James Kelley, Roberto Tamassia, Nikos Triandopoulos
      Pages 19-36
    3. Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 37-54
    4. Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld
      Pages 55-72
  3. Formal Models for Cryptography and Access Control

    1. Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows et al.
      Pages 73-90
    2. Sebastian Mödersheim
      Pages 127-144
  4. Security and Privacy in Mobile and Wireless Networks

    1. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian
      Pages 145-162
    2. Ruben Rios, Jorge Cuellar, Javier Lopez
      Pages 163-180
    3. Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
      Pages 181-198
  5. Counteracting Man-in-the-Middle Attacks

    1. Italo Dacosta, Mustaque Ahamad, Patrick Traynor
      Pages 199-216
    2. Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle
      Pages 217-234
    3. Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic
      Pages 235-252
  6. Network Security

    1. Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
      Pages 253-270
    2. Amir Herzberg, Haya Shulman
      Pages 271-288
  7. Users Privacy and Anonymity

    1. Mishari Almishari, Gene Tsudik
      Pages 307-324
    2. Naipeng Dong, Hugo Jonker, Jun Pang
      Pages 325-342

About these proceedings


This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.


Android authentication protocols cloud computing security and privacy wireless networks

Editors and affiliations

  • Sara Foresti
    • 1
  • Moti Yung
    • 2
  • Fabio Martinelli
    • 3
  1. 1.Dipartimento di InformaticaUniversità degli Studi di MilanoCremaItaly
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUS
  3. 3.Institute of Informatics and Telematics, Information Security GroupNational Research CouncilPisaItaly

Bibliographic information