Skip to main content
  • Conference proceedings
  • © 2013

Computer Security -- ESORICS 2013

18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8134)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (43 papers)

  1. Front Matter

  2. Cryptography and Computation

    1. Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits

      • Ivan DamgÃ¥rd, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
      Pages 1-18
    2. Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn

      • Jan Camenisch, Robert R. Enderlein, Victor Shoup
      Pages 19-37
    3. Privacy-Preserving Accountable Computation

      • Michael Backes, Dario Fiore, Esfandiar Mohammadi
      Pages 38-56
  3. Measurement and Evaluation

    1. Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode

      • Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi
      Pages 57-74
    2. A Quantitative Evaluation of Privilege Separation in Web Browser Designs

      • Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang
      Pages 75-93
    3. Estimating Asset Sensitivity by Profiling Users

      • Youngja Park, Christopher Gates, Stephen C. Gates
      Pages 94-110
  4. Applications of Cryptography

    1. Practical Secure Logging: Seekable Sequential Key Generators

      • Giorgia Azzurra Marson, Bertram Poettering
      Pages 111-128
    2. Request-Based Comparable Encryption

      • Jun Furukawa
      Pages 129-146
  5. Code Analysis

    1. HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism

      • Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song
      Pages 164-181
    2. AnDarwin: Scalable Detection of Semantically Similar Android Applications

      • Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 182-199
  6. Network Security

    1. Vulnerable Delegation of DNS Resolution

      • Amir Herzberg, Haya Shulman
      Pages 219-236
    2. Formal Approach for Route Agility against Persistent Attackers

      • Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan
      Pages 237-254
    3. Plug-and-Play IP Security

      • Yossi Gilad, Amir Herzberg
      Pages 255-272
  7. Formal Models and Methods

    1. Managing the Weakest Link

      • Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
      Pages 273-290
    2. Automated Security Proofs for Almost-Universal Hash for MAC Verification

      • Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
      Pages 291-308
    3. Bounded Memory Protocols and Progressing Collaborative Systems

      • Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov
      Pages 309-326
    4. Universally Composable Key-Management

      • Steve Kremer, Robert Künnemann, Graham Steel
      Pages 327-344

Other Volumes

  1. Computer Security – ESORICS 2013

About this book

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

Editors and Affiliations

  • Information Security Group, University of London, Royal Holloway, Egham Hill, UK

    Jason Crampton, Keith Mayes

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access