Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings /

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research i...

Full description

Saved in:
Bibliographic Details
Corporate Authors: European Symposium on Research in Computer Security Egham, England); SpringerLink (Online service)
Group Author: Crampton, Jason; Jajodia, Sushil.; Mayes, Keith E.
Published: Springer,
Publisher Address: Heidelberg :
Publication Dates: [2013]
2013
Literature type: eBook
Language: English
Series: Lecture notes in computer science, 8134
LNCS sublibrary SL 4 security and cryptology
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-40203-6
Summary: This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.
Carrier Form: 1 online resource (xviii, 794 pages) : illustrations.
Bibliography: Includes bibliographical references and index.
ISBN: 9783642402036 (electronic bk.)
3642402038 (electronic bk.)
Index Number: QA76
CLC: TP309-532
Contents: Cryptography and Computation.
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits /
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn /
Privacy-Preserving Accountable Computation /
Measurement and Evaluation.
Verifying Web Browser Extensions' Compliance with Private-Browsing Mode /
A Quantitative Evaluation of Privilege Separation in Web Browser Designs /
Estimating Asset Sensitivity by Profiling Users /
Applications of Cryptography.
Practical Secure Logging: Seekable Sequential Key Generators /
Request-Based Comparable Encryption /
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud /
Code Analysis.
HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism /
AnDarwin: Scalable Detection of Semantically Similar Android Applications /
BISTRO: Binary Component Extraction and Embedding for Software Security Applications /
Network Security.
Vulnerable Delegation of DNS Resolution /
Formal Approach for Route Agility against Persistent Attackers /
Plug-and-Play IP Security /
Formal Models and Methods.
Managing the Weakest Link /
Automated Security Proofs for Almost-Universal Hash for MAC Verification /
Bounded Memory Protocols and Progressing Collaborative Systems /
Universally Composable Key-Management /
Protocol Analysis.
A Cryptographic Analysis of OPACITY /
Symbolic Probabilistic Analysis of Off-Line Guessing /
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems /
Privacy Enhancing Models and Technologies.
Efficient Privacy-Enhanced Familiarity-Based Recommender System /
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation /
Privacy-Preserving Matching of Community-Contributed Content /
E-voting and Privacy.
Ballot Secrecy and Ballot Independence Coincide /
Election Verifiability or Ballot Privacy: Do We Need to Choose? /
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations /
Malware Detection.
Mining Malware Specifications through Static Reachability Analysis /
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies /
Measuring and Detecting Malware Downloads in Live Network Traffic /
Access Control.
Automated Certification of Authorisation Policy Resistance /
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption /
Purpose Restrictions on Information Use /
Distributed Shuffling for Preserving Access Confidentiality /
Attacks.
Range Extension Attacks on Contactless Smart Cards /
CellFlood: Attacking Tor Onion Routers on the Cheap /
Nowhere to Hide: Navigating around Privacy in Online Social Networks /
Current Events: Identifying Webpages by Tapping the Electrical Outlet /
Language-Based Protection.
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling /
Data-Confined HTML5 Applications /
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks /
Run-Time Enforcement of Information-Flow Properties on Android /