Skip to main content
  • Conference proceedings
  • © 2016

Computer Security – ESORICS 2016

21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9878)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

    Pages I-XIX
  2. Network and Web Security

    1. Front Matter

      Pages 1-1
    2. Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution

      • Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad
      Pages 3-26
    3. Toward an Efficient Website Fingerprinting Defense

      • Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
      Pages 27-46
    4. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack

      • Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang et al.
      Pages 47-66
  3. Authentication

    1. Front Matter

      Pages 67-67
    2. Comparing Password Ranking Algorithms on Real-World Password Datasets

      • Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari
      Pages 69-90
    3. Scalable Two-Factor Authentication Using Historical Data

      • Aldar C.-F. Chan, Jun Wen Wong, Jianying Zhou, Joseph Teo
      Pages 91-110
    4. On the Implications of Zipf’s Law in Passwords

      • Ding Wang, Ping Wang
      Pages 111-131
  4. Encrypted Search

    1. Front Matter

      Pages 133-133
    2. PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching

      • Jun Zhou, Zhenfu Cao, Xiaolei Dong
      Pages 135-153
    3. An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries

      • Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
      Pages 154-172
    4. Efficient Encrypted Keyword Search for Multi-user Data Sharing

      • Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
      Pages 173-195
  5. Detection and Monitoring

    1. Front Matter

      Pages 197-197
    2. Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis

      • Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi, Levente Buttyán
      Pages 199-216
    3. Mobile Application Impersonation Detection Using Dynamic User Interface Extraction

      • Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun
      Pages 217-237
    4. A Machine Learning Approach for Detecting Third-Party Trackers on the Web

      • Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen
      Pages 238-258
  6. Cryptography for Cloud Computing

    1. Front Matter

      Pages 259-259
    2. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

      • Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud
      Pages 261-278
    3. Attribute-Based Signatures for Supporting Anonymous Certification

      • Nesrine Kaaniche, Maryline Laurent
      Pages 279-300

Other Volumes

  1. Computer Security – ESORICS 2016

About this book

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.

The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.

Editors and Affiliations

  • Institute of Computer Science, Found for Research & Technology - Hellas, Heraklion, Greece

    Ioannis Askoxylakis

  • Institute of Computer Science, Foundation for Research and Technology - Hellas, Heraklion, Greece

    Sotiris Ioannidis

  • Norwegian Univ. of Science & Technology , Gjøvik, Norway

    Sokratis Katsikas

  • Naval Research Laboratory , Washington, USA

    Catherine Meadows

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access