Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I

Voorkant
Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Springer, 1 sep. 2017 - 485 pagina's
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
 

Wat mensen zeggen - Een review schrijven

We hebben geen reviews gevonden op de gebruikelijke plaatsen.

Geselecteerde pagina's

Inhoudsopgave

From Intrusion Detection to Software Design
1
Justifying Security Measures a Position Paper
11
The Once and Future Onion
18
Tightly Secure RingLWE Based Key Encapsulation with Short Ciphertexts
29
TreeBased Cryptographic Access Control
47
Source Code Authorship Attribution Using Long ShortTerm Memory Based Networks
65
Is My Attack Tree Correct?
83
ServerAided Secure Computation with Offline Parties
103
Verifying ConstantTime Implementations by Abstract Interpretation
260
Toward a Stealthier and Modular Malware Analysis Sandbox for Android
278
Zero RoundTrip Time for the Extended Access Control Protocol
297
ServerSupported RSA Signatures for Mobile Devices
315
Verifiable Document Redacting
334
Securing Data Analytics on SGX with Randomization
352
Detecting Phishing Webpages in Compromised Websites
370
A Formal Analysis of DNP3 SAv5
389

Relating InformationFlow Trackers
124
Labeled Homomorphic Encryption
146
Moving Target Defense for CloudBased IT Systems
167
Modular Verification of Protocol Equivalence in the Presence of Randomness
187
Noninteractive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
206
Reusing Nonces in Schnorr Signatures
224
FineGrained Information Flow Policies for Web Browsers
242
PasswordBased Cryptography Revisited
408
AVR Processors as a Platform for LanguageBased Security
427
A Better Composition Operator for Quantitative Information Flow Analyses
446
Analyzing the Capabilities of the CAN Attacker
464
PerSession Security PasswordBased Cryptography Revisited
483
Author Index
483
Copyright

Overige edities - Alles weergeven

Veelvoorkomende woorden en zinsdelen

Bibliografische gegevens