Skip to main content
  • Conference proceedings
  • © 2015

Computer Security -- ESORICS 2015

20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9326)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-XVIII
  2. Networks and Web Security

    1. Front Matter

      Pages 1-1
    2. Towards Security of Internet Naming Infrastructure

      • Haya Shulman, Michael Waidner
      Pages 3-22
    3. Waiting for CSP – Securing Legacy Web Applications with JSAgents

      • Mario Heiderich, Marcus Niemietz, Jörg Schwenk
      Pages 23-42
  3. System Security

    1. Front Matter

      Pages 67-67
    2. A Practical Approach for Adaptive Data Structure Layout Randomization

      • Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu
      Pages 69-89
    3. Trustworthy Prevention of Code Injection in Linux on Embedded Devices

      • Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam, Patrik Ekdahl
      Pages 90-107
    4. Practical Memory Deduplication Attacks in Sandboxed Javascript

      • Daniel Gruss, David Bidner, Stefan Mangard
      Pages 108-122
  4. Cryptography

    1. Front Matter

      Pages 123-123
    2. Computational Soundness for Interactive Primitives

      • Michael Backes, Esfandiar Mohammadi, Tim Ruffing
      Pages 125-145
    3. Verifiably Encrypted Signatures: Security Revisited and a New Construction

      • Christian Hanser, Max Rabkin, Dominique Schröder
      Pages 146-164
    4. Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions

      • Gildas Avoine, Xavier Carpent, Cédric Lauradoux
      Pages 165-184
    5. Symmetric-Key Based Proofs of Retrievability Supporting Public Verification

      • Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu
      Pages 203-223
    6. DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead

      • Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
      Pages 224-242
    7. Short Accountable Ring Signatures Based on DDH

      • Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
      Pages 243-265
    8. Updatable Hash Proof System and Its Applications

      • Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu
      Pages 266-285
    9. Server-Aided Revocable Identity-Based Encryption

      • Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu
      Pages 286-304
    10. Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings

      • Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
      Pages 305-325

Other Volumes

  1. Computer Security -- ESORICS 2015

About this book

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.

The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.    

Editors and Affiliations

  • University of Regensburg, Regensburg, Germany

    Günther Pernul

  • University of Luxembourg, Luxembourg, Luxembourg

    Peter Y A Ryan

  • SBA Research, Wien, Austria

    Edgar Weippl

About the editors

   

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access