Advertisement

Computer Security – ESORICS 2011

16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings

  • Vijay Atluri
  • Claudia Diaz
Conference proceedings ESORICS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6879)

Table of contents

  1. Front Matter
  2. Wireless Security

    1. Nashad A. Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi
      Pages 1-20
    2. Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
      Pages 40-59
  3. Web Security I

    1. Yuchen Zhou, David Evans
      Pages 60-79
    2. Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens
      Pages 100-116
  4. Web Security II

    1. Elie Bursztein, Baptiste Gourdin, John C. Mitchell
      Pages 133-149
    2. Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Richard Shin, Dawn Song
      Pages 150-171
  5. Forensics, Biometrics and Software Protection

    1. Nathan Rosenblum, Xiaojin Zhu, Barton P. Miller
      Pages 172-189
    2. Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
      Pages 210-226
    3. Yueqiang Cheng, Xuhua Ding, Robert H. Deng
      Pages 227-244
  6. Access Control

    1. Steve Barker, Valerio Genovese
      Pages 262-277
    2. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen
      Pages 278-297
  7. Cryptography and Protocol Analysis

    1. Dominique Schröder
      Pages 298-314
    2. David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
      Pages 335-354
  8. Information Flow, Side Channels, and Vulnerability Analysis

    1. Billy Bob Brumley, Nicola Tuveri
      Pages 355-371
    2. Arnar Birgisson, Andrei Sabelfeld
      Pages 372-391
    3. Sören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson
      Pages 392-415
    4. Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian
      Pages 416-433
  9. Usability, Ttrust, and Economics of Security and Privacy

    1. Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun
      Pages 434-451
    2. Amir Herzberg, Ronen Margulies
      Pages 452-471
    3. Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro
      Pages 472-488
    4. Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle
      Pages 489-507
  10. Privacy I

    1. Dang Vinh Pham, Joss Wright, Dogan Kesdogan
      Pages 508-527
    2. Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
      Pages 528-547
    3. Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux
      Pages 548-567
  11. Privacy II

    1. Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel
      Pages 568-587
    2. Michele Boreale, Francesca Pampaloni, Michela Paolini
      Pages 588-606
    3. Xiaoyong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, XiaoFeng Wang
      Pages 607-627
  12. Privacy III

    1. Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu
      Pages 628-647
    2. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
      Pages 648-664
    3. Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny
      Pages 665-683
  13. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers included in the book were carefully reviewed and selected from 155 papers. The articles are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; cryptography and protocol analysis; information flow, side channels, and vulnerability analysis; usability, trust, and economics of security and privacy; and privacy.

Keywords

anonymity elliptic curve cryptography malware analysis sandbox software obfuscation

Editors and affiliations

  • Vijay Atluri
    • 1
  • Claudia Diaz
    • 2
  1. 1.MSIS Department and CIMICRutgers UniversityNewarkUSA
  2. 2.K.U. Leuven ESAT-COSICLeuven-HeverleeBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-23822-2
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-23821-5
  • Online ISBN 978-3-642-23822-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering