Security and Cryptology

Computer Security -- ESORICS 2012

17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings

Editors: Foresti, Sara, Young, Moti, Martinelli, Fabio (Eds.)

  • Fast-track conference proceedings
  • Sate-of-the-art research
  • Up-to-date results
see more benefits

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-642-33167-1
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $143.00
price for USA
  • ISBN 978-3-642-33166-4
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Table of contents (50 chapters)

  • Modeling and Enhancing Android’s Permission System

    Fragkaki, Elli (et al.)

    Pages 1-18

  • Hardening Access Control and Data Protection in GFS-like File Systems

    Kelley, James (et al.)

    Pages 19-36

  • Attack of the Clones: Detecting Cloned Applications on Android Markets

    Crussell, Jonathan (et al.)

    Pages 37-54

  • Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing

    Birgisson, Arnar (et al.)

    Pages 55-72

  • Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions

    Erbatur, Serdar (et al.)

    Pages 73-90

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-642-33167-1
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $143.00
price for USA
  • ISBN 978-3-642-33166-4
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Computer Security -- ESORICS 2012
Book Subtitle
17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings
Editors
  • Sara Foresti
  • Moti Young
  • Fabio Martinelli
Series Title
Security and Cryptology
Series Volume
7459
Copyright
2012
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-642-33167-1
DOI
10.1007/978-3-642-33167-1
Softcover ISBN
978-3-642-33166-4
Edition Number
1
Number of Pages
XVII, 896
Number of Illustrations and Tables
210 b/w illustrations
Topics