Skip to main content

Computer Security -- ESORICS 2012

17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings

  • Conference proceedings
  • © 2012

Overview

  • Fast-track conference proceedings
  • Sate-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7459)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ESORICS 2012.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (50 papers)

  1. Security and Data Protection in Real Systems

  2. Formal Models for Cryptography and Access Control

  3. Security and Privacy in Mobile and Wireless Networks

  4. Counteracting Man-in-the-Middle Attacks

  5. Network Security

  6. Users Privacy and Anonymity

Other volumes

  1. Computer Security – ESORICS 2012

Keywords

About this book

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Editors and Affiliations

  • Dipartimento di Informatica, Università degli Studi di Milano, Crema, Italy

    Sara Foresti

  • Computer Science Department, Columbia University, New York, US

    Moti Yung

  • Institute of Informatics and Telematics, Information Security Group, National Research Council, Pisa, Italy

    Fabio Martinelli

Bibliographic Information

Publish with us