Skip to main content
Book cover

Computer Security - ESORICS 2008

13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

  • Conference proceedings
  • © 2008

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5283)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ESORICS 2008.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (37 papers)

  1. Session 1: Intrusion Detection and Network Vulnerability Analysis

  2. Session 2: Network Security

  3. Session 3: Smart Cards and Identity Management

  4. Session 4: Data and Applications Security

  5. Session 5: Privacy Enhancing Technologies

  6. Session 6: Anonymity and RFID Privacy

  7. Session 7: Access Control and Trust Negotiation

Other volumes

  1. Computer Security - ESORICS 2008

Keywords

About this book

These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security––ESORICS 2008––held October 6–8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for papers, 168 papers were submitted to the symposium. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the Program Comm- tee. The Program Committee meeting was held electronically, holding intensive d- cussion over a period of two weeks. Finally, 37 papers were selected for presentation at the symposium, giving an acceptance rate of 22%.

Editors and Affiliations

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia

  • Department of Computer Science, University of Malaga, Málaga, Spain

    Javier Lopez

Bibliographic Information

Publish with us