Advertisement

Computer Security -- ESORICS 2015

20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II

  • Günther Pernul
  • Peter Y A Ryan
  • Edgar Weippl

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9327)

Also part of the Security and Cryptology book sub series (LNSC, volume 9327)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Privacy

    1. Front Matter
      Pages 1-1
    2. Christof Ferreira Torres, Hugo Jonker, Sjouke Mauw
      Pages 3-19
    3. Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, Zhou Li
      Pages 20-39
    4. Xingliang Yuan, Helei Cui, Xinyu Wang, Cong Wang
      Pages 40-60
    5. Yao Zheng, Bing Wang, Wenjing Lou, Y. Thomas Hou
      Pages 61-80
    6. Florian Kerschbaum, Hoon Wei Lim
      Pages 81-100
  3. Cloud Security

    1. Front Matter
      Pages 121-121
    2. Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
      Pages 123-145
    3. Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou
      Pages 146-166
    4. Liang Feng Zhang, Reihaneh Safavi-Naini
      Pages 167-185
    5. Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang
      Pages 186-205
  4. Protocols and Attribute-based Encryption

    1. Front Matter
      Pages 207-207
    2. Omar Almousa, Sebastian Mödersheim, Paolo Modesti, Luca Viganò
      Pages 209-229
    3. Rémy Chrétien, Véronique Cortier, Stéphanie Delaune
      Pages 230-251
    4. Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen
      Pages 252-269
  5. Code Analysis and Side-Channels

    1. Front Matter
      Pages 291-291
    2. Yueqian Zhang, Xiapu Luo, Haoyang Yin
      Pages 293-311
    3. Hong Hu, Zheng Leong Chua, Zhenkai Liang, Prateek Saxena
      Pages 312-331
    4. Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia
      Pages 332-351
  6. Detection and Monitoring

    1. Front Matter
      Pages 353-353
    2. Sufatrio, Tong-Wei Chua, Darell J. J. Tan, Vrizlynn L. L. Thing
      Pages 355-375
    3. Maximilian Seitzer, Michael Gruhn, Tilo Müller
      Pages 376-395
    4. Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Chris Gates, Ninghi Li
      Pages 396-414
  7. Authentication

    1. Front Matter
      Pages 415-415
    2. Jingyu Hua, Shaoyong Du, Sheng Zhong
      Pages 417-437
    3. Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright, Shannon Scielzo
      Pages 438-455
    4. Ding Wang, Ping Wang
      Pages 456-477
  8. Policies

    1. Front Matter
      Pages 479-479
    2. Donald Ray, Jay Ligatti
      Pages 481-499
    3. Ximeng Li, Flemming Nielson, Hanne Riis Nielson
      Pages 500-519
    4. Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson
      Pages 520-538
  9. Applied Security

    1. Front Matter
      Pages 539-539
    2. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 541-560
    3. Christian Decker, James Guthrie, Jochen Seidel, Roger Wattenhofer
      Pages 561-576
    4. Behnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, Zhenkai Liang
      Pages 577-598
    5. Dibya Mukhopadhyay, Maliheh Shirvanian, Nitesh Saxena
      Pages 599-621
    6. Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun, Samuel Dubus
      Pages 642-661
  10. Back Matter
    Pages 663-665

About these proceedings

Introduction

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.

The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

Keywords

Applied security Cloud security Cryptography Networks & web security Risk analysis Authentication Cloud computing Code analysis & side-channels Crypto applications & attacks Detection & monitoring Distributed algorithms Internet of things Malware detection Password cracking Policies Privacy Protocols & attribute-based encryption Public-key encryption Social networks System security

Editors and affiliations

  • Günther Pernul
    • 1
  • Peter Y A Ryan
    • 2
  • Edgar Weippl
    • 3
  1. 1.University of RegensburgRegensburgGermany
  2. 2.University of LuxembourgLuxembourgLuxembourg
  3. 3.SBA ResearchWienAustria

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-24177-7
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-24176-0
  • Online ISBN 978-3-319-24177-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering