↓ Skip to main content

Computer Security – ESORICS 2013

Overview of attention for book
Cover of 'Computer Security – ESORICS 2013'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits
  3. Altmetric Badge
    Chapter 2 Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤ n
  4. Altmetric Badge
    Chapter 3 Privacy-Preserving Accountable Computation
  5. Altmetric Badge
    Chapter 4 Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode
  6. Altmetric Badge
    Chapter 5 A Quantitative Evaluation of Privilege Separation in Web Browser Designs
  7. Altmetric Badge
    Chapter 6 Estimating Asset Sensitivity by Profiling Users
  8. Altmetric Badge
    Chapter 7 Practical Secure Logging: Seekable Sequential Key Generators
  9. Altmetric Badge
    Chapter 8 Request-Based Comparable Encryption
  10. Altmetric Badge
    Chapter 9 Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud
  11. Altmetric Badge
    Chapter 10 HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism
  12. Altmetric Badge
    Chapter 11 AnDarwin: Scalable Detection of Semantically Similar Android Applications
  13. Altmetric Badge
    Chapter 12 BISTRO: Binary Component Extraction and Embedding for Software Security Applications
  14. Altmetric Badge
    Chapter 13 Vulnerable Delegation of DNS Resolution
  15. Altmetric Badge
    Chapter 14 Formal Approach for Route Agility against Persistent Attackers
  16. Altmetric Badge
    Chapter 15 Plug-and-Play IP Security
  17. Altmetric Badge
    Chapter 16 Managing the Weakest Link
  18. Altmetric Badge
    Chapter 17 Automated Security Proofs for Almost-Universal Hash for MAC Verification
  19. Altmetric Badge
    Chapter 18 Bounded Memory Protocols and Progressing Collaborative Systems
  20. Altmetric Badge
    Chapter 19 Universally Composable Key-Management
  21. Altmetric Badge
    Chapter 20 A Cryptographic Analysis of OPACITY
  22. Altmetric Badge
    Chapter 21 Symbolic Probabilistic Analysis of Off-Line Guessing
  23. Altmetric Badge
    Chapter 22 Computer Security – ESORICS 2013
  24. Altmetric Badge
    Chapter 23 Efficient Privacy-Enhanced Familiarity-Based Recommender System
  25. Altmetric Badge
    Chapter 24 Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation
  26. Altmetric Badge
    Chapter 25 Privacy-Preserving Matching of Community-Contributed Content
  27. Altmetric Badge
    Chapter 26 Ballot Secrecy and Ballot Independence Coincide
  28. Altmetric Badge
    Chapter 27 Election Verifiability or Ballot Privacy: Do We Need to Choose?
  29. Altmetric Badge
    Chapter 28 Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
  30. Altmetric Badge
    Chapter 29 Mining Malware Specifications through Static Reachability Analysis
  31. Altmetric Badge
    Chapter 30 Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies
  32. Altmetric Badge
    Chapter 31 Measuring and Detecting Malware Downloads in Live Network Traffic
  33. Altmetric Badge
    Chapter 32 Automated Certification of Authorisation Policy Resistance
  34. Altmetric Badge
    Chapter 33 Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption
  35. Altmetric Badge
    Chapter 34 Purpose Restrictions on Information Use
  36. Altmetric Badge
    Chapter 35 Distributed Shuffling for Preserving Access Confidentiality
  37. Altmetric Badge
    Chapter 36 Range Extension Attacks on Contactless Smart Cards
  38. Altmetric Badge
    Chapter 37 CellFlood: Attacking Tor Onion Routers on the Cheap
  39. Altmetric Badge
    Chapter 38 Nowhere to Hide: Navigating around Privacy in Online Social Networks
  40. Altmetric Badge
    Chapter 39 Current Events: Identifying Webpages by Tapping the Electrical Outlet
  41. Altmetric Badge
    Chapter 40 Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
  42. Altmetric Badge
    Chapter 41 Data-Confined HTML5 Applications
  43. Altmetric Badge
    Chapter 42 KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks
  44. Altmetric Badge
    Chapter 43 Run-Time Enforcement of Information-Flow Properties on Android
Attention for Chapter 5: A Quantitative Evaluation of Privilege Separation in Web Browser Designs
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Readers on

mendeley
30 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A Quantitative Evaluation of Privilege Separation in Web Browser Designs
Chapter number 5
Book title
Computer Security – ESORICS 2013
Published by
Springer, Berlin, Heidelberg, September 2013
DOI 10.1007/978-3-642-40203-6_5
Book ISBNs
978-3-64-240202-9, 978-3-64-240203-6
Authors

Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang, Dong, Xinshu, Hu, Hong, Saxena, Prateek, Liang, Zhenkai

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 30 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 3%
Chile 1 3%
United States 1 3%
Unknown 27 90%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 23%
Researcher 6 20%
Student > Master 4 13%
Professor > Associate Professor 3 10%
Student > Bachelor 2 7%
Other 5 17%
Unknown 3 10%
Readers by discipline Count As %
Computer Science 24 80%
Physics and Astronomy 1 3%
Engineering 1 3%
Design 1 3%
Unknown 3 10%