Skip to main content
  • Conference proceedings
  • © 2010

Computer Security - ESORICS 2010

15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

  • up-to-date results
  • fast track conference proceedings
  • state-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6345)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2010.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (42 papers)

  1. Front Matter

  2. RFID and Privacy

    1. A New Framework for RFID Privacy

      • Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
      Pages 1-18
    2. Readers Behaving Badly

      • Rishab Nithyanand, Gene Tsudik, Ersin Uzun
      Pages 19-36
    3. Privacy-Preserving, Taxable Bank Accounts

      • Elli Androulaki, Binh Vo, Steven Bellovin
      Pages 37-54
    4. Formal Analysis of Privacy for Vehicular Mix-Zones

      • Morten Dahl, Stéphanie Delaune, Graham Steel
      Pages 55-70
  3. Software Security

    1. IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time

      • Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou
      Pages 71-86
    2. A Theory of Runtime Enforcement, with Results

      • Jay Ligatti, Srikar Reddy
      Pages 87-100
    3. Enforcing Secure Object Initialization in Java

      • Laurent Hubert, Thomas Jensen, Vincent Monfort, David Pichardie
      Pages 101-115
    4. Flexible Scheduler-Independent Security

      • Heiko Mantel, Henning Sudbrock
      Pages 116-133
  4. Cryptographic Protocols

    1. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic

      • Octavian Catrina, Sebastiaan de Hoogh
      Pages 134-150
    2. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols

      • José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 151-167
    3. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model

      • Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
      Pages 168-181
    4. DR@FT: Efficient Remote Attestation Framework for Dynamic Systems

      • Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert
      Pages 182-198
  5. Traffic Analysis

    1. Website Fingerprinting and Identification Using Ordered Feature Sequences

      • Liming Lu, Ee-Chien Chang, Mun Choon Chan
      Pages 199-214
    2. Web Browser History Detection as a Real-World Privacy Threat

      • Artur Janc, Lukasz Olejnik
      Pages 215-231
    3. On the Secrecy of Spread-Spectrum Flow Watermarks

      • Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee
      Pages 232-248
    4. Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation

      • Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis
      Pages 249-267
  6. End-User Security

    1. A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection

      • Guang Xiang, Bryan A. Pendleton, Jason Hong, Carolyn P. Rose
      Pages 268-285
    2. Kamouflage: Loss-Resistant Password Management

      • Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh
      Pages 286-302
  7. Formal Analysis

    1. Sequential Protocol Composition in Maude-NPA

      • Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago
      Pages 303-318

Other Volumes

  1. Computer Security – ESORICS 2010

About this book

The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was also organized to arrive at the ?nal decision. As a result of the review process, 42 papers were selected for the ?nal program, resulting in an - ceptance rate of as low as 21%. The authors of accepted papers were requested to revise their papers, based on the comments received. The program was c- pleted with an invited talk by Udo Helmbrecht, Executive Director of ENISA (European Network and Information Security Agency). ESORICS 2010 was organized under the aegisof three Ministries of the G- ernment of Greece, namely: (a) the Ministry of Infrastructure, Transport, and Networks, (b) the General Secretariat for Information Systems of the Ministry of Economy and Finance, and (c) the General Secretariat for e-Governance of the Ministry of Interior, Decentralization, and e-Government.

Editors and Affiliations

  • Information Security and Critical Infrastructure Protection Research Group, Dept. of Informatics, Athens University of Economics and Business, Athens, Greece

    Dimitris Gritzalis, Marianthi Theoharidou

  • Dept. Electrical Engineering-ESAT/COSIC, Katholieke Universiteit Leuven, Leuven, Belgium

    Bart Preneel

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access