Skip to main content
  • Conference proceedings
  • © 2014

Computer Security - ESORICS 2014

19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8712)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Detecting Malicious Domains via Graph Inference

    • Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William Horne
    Pages 1-18
  3. Empirically Measuring WHOIS Misuse

    • Nektarios Leontiadis, Nicolas Christin
    Pages 19-36
  4. EncDNS: A Lightweight Privacy-Preserving Name Resolution Service

    • Dominik Herrmann, Karl-Peter Fuchs, Jens Lindemann, Hannes Federrath
    Pages 37-55
  5. Ubic: Bridging the Gap between Digital Cryptography and the Physical World

    • Mark Simkin, Dominique Schröder, Andreas Bulling, Mario Fritz
    Pages 56-75
  6. Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks

    • Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter
    Pages 76-93
  7. Local Password Validation Using Self-Organizing Maps

    • Diogo Mónica, Carlos Ribeiro
    Pages 94-111
  8. Verifiable Delegation of Computations with Storage-Verification Trade-off

    • Liang Feng Zhang, Reihaneh Safavi-Naini
    Pages 112-129
  9. Verifiable Computation over Large Database with Incremental Updates

    • Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou
    Pages 148-162
  10. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications

    • Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip Porras
    Pages 163-182
  11. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models

    • Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez
    Pages 183-201
  12. TrustDump: Reliable Memory Acquisition on Smartphones

    • He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia
    Pages 202-218
  13. A Framework to Secure Peripherals at Runtime

    • Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
    Pages 219-238
  14. StealthGuard: Proofs of Retrievability with Hidden Watchdogs

    • Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen
    Pages 239-256
  15. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing

    • Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
    Pages 257-272
  16. Verifiable Computation on Outsourced Encrypted Data

    • Junzuo Lai, Robert H. Deng, Hweehwa Pang, Jian Weng
    Pages 273-291
  17. Verifiable Computation with Reduced Informational Costs and Computational Costs

    • Gang Xu, George T. Amariucai, Yong Guan
    Pages 292-309
  18. Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization

    • Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai
    Pages 310-325
  19. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage

    • Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu et al.
    Pages 326-343

Other Volumes

  1. Computer Security - ESORICS 2014

About this book

The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.

Editors and Affiliations

  • Department of Fundamental Problems of Technology, Wrocław University of Technology, Wrocław, Poland

    Mirosław Kutyłowski

  • MSIS Department, Rutgers University, USA

    Jaideep Vaidya

Bibliographic Information

  • Book Title: Computer Security - ESORICS 2014

  • Book Subtitle: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

  • Editors: Mirosław Kutyłowski, Jaideep Vaidya

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-11203-9

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-11202-2Published: 23 September 2014

  • eBook ISBN: 978-3-319-11203-9Published: 15 August 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVI, 545

  • Number of Illustrations: 122 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access