Computer Security – ESORICS 2013

18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings

  • Jason Crampton
  • Sushil Jajodia
  • Keith Mayes
Conference proceedings ESORICS 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8134)

Table of contents

  1. Front Matter
  2. Cryptography and Computation

    1. Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
      Pages 1-18
    2. Jan Camenisch, Robert R. Enderlein, Victor Shoup
      Pages 19-37
    3. Michael Backes, Dario Fiore, Esfandiar Mohammadi
      Pages 38-56
  3. Measurement and Evaluation

    1. Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi
      Pages 57-74
    2. Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang
      Pages 75-93
    3. Youngja Park, Christopher Gates, Stephen C. Gates
      Pages 94-110
  4. Applications of Cryptography

  5. Code Analysis

    1. Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song
      Pages 164-181
    2. Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 182-199
  6. Network Security

    1. Amir Herzberg, Haya Shulman
      Pages 219-236
    2. Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan
      Pages 237-254
    3. Yossi Gilad, Amir Herzberg
      Pages 255-272
  7. Formal Models and Methods

    1. Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
      Pages 273-290
    2. Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
      Pages 291-308
    3. Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov
      Pages 309-326
    4. Steve Kremer, Robert Künnemann, Graham Steel
      Pages 327-344
  8. Protocol Analysis

    1. Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
      Pages 345-362
    2. Bruno Conchinha, David Basin, Carlos Caleiro
      Pages 363-380
    3. Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
      Pages 381-399
  9. Privacy Enhancing Models and Technologies

    1. Arjan Jeckmans, Andreas Peter, Pieter Hartel
      Pages 400-417
    2. Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk
      Pages 418-442
    3. Mishari Almishari, Paolo Gasti, Gene Tsudik, Ekin Oguz
      Pages 443-462
  10. E-voting and Privacy

    1. Ben Smyth, David Bernhard
      Pages 463-480
    2. Édouard Cuvelier, Olivier Pereira, Thomas Peters
      Pages 481-498
  11. Malware Detection

    1. Hugo Daniel Macedo, Tayssir Touili
      Pages 517-535
    2. Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis
      Pages 556-573
  12. Access Control

    1. Andreas Griesmayer, Charles Morisset
      Pages 574-591
    2. Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou
      Pages 592-609
    3. Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing
      Pages 610-627
    4. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
      Pages 628-645
  13. Attacks

    1. Yossef Oren, Dvir Schirman, Avishai Wool
      Pages 646-663
    2. Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis
      Pages 664-681
    3. Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux
      Pages 682-699
    4. Shane S. Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu
      Pages 700-717
  14. Language-Based Protection

    1. Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo et al.
      Pages 718-735
    2. Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song
      Pages 736-754
    3. Jinpeng Wei, Feng Zhu, Calton Pu
      Pages 755-774
    4. Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima et al.
      Pages 775-792
  15. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.
The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.


attacks cryptography mobile devices privacy preservation web browsers

Editors and affiliations

  • Jason Crampton
    • 1
  • Sushil Jajodia
    • 2
  • Keith Mayes
    • 1
  1. 1.Information Security GroupUniversity of London, Royal HollowayEgham HillUK
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-40202-9
  • Online ISBN 978-3-642-40203-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment