↓ Skip to main content

Computer Security – ESORICS 2012

Overview of attention for book
Cover of 'Computer Security – ESORICS 2012'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Modeling and Enhancing Android’s Permission System
  3. Altmetric Badge
    Chapter 2 Hardening Access Control and Data Protection in GFS-like File Systems
  4. Altmetric Badge
    Chapter 3 Attack of the Clones: Detecting Cloned Applications on Android Markets
  5. Altmetric Badge
    Chapter 4 Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing
  6. Altmetric Badge
    Chapter 5 Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions
  7. Altmetric Badge
    Chapter 6 Deciding Epistemic and Strategic Properties of Cryptographic Protocols
  8. Altmetric Badge
    Chapter 7 Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model
  9. Altmetric Badge
    Chapter 8 Deciding Security for a Fragment of ASLan
  10. Altmetric Badge
    Chapter 9 A Probabilistic Framework for Localization of Attackers in MANETs
  11. Altmetric Badge
    Chapter 10 Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
  12. Altmetric Badge
    Chapter 11 Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks
  13. Altmetric Badge
    Chapter 12 Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties
  14. Altmetric Badge
    Chapter 13 X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
  15. Altmetric Badge
    Chapter 14 A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols
  16. Altmetric Badge
    Chapter 15 The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
  17. Altmetric Badge
    Chapter 16 Security of Patched DNS
  18. Altmetric Badge
    Chapter 17 Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach
  19. Altmetric Badge
    Chapter 18 Exploring Linkability of User Reviews
  20. Altmetric Badge
    Chapter 19 Formal Analysis of Privacy in an eHealth Protocol
  21. Altmetric Badge
    Chapter 20 PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters
  22. Altmetric Badge
    Chapter 21 SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags
  23. Altmetric Badge
    Chapter 22 Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
  24. Altmetric Badge
    Chapter 23 Enhancing Location Privacy for Electric Vehicles (at the Right time)
  25. Altmetric Badge
    Chapter 24 Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
  26. Altmetric Badge
    Chapter 25 Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System
  27. Altmetric Badge
    Chapter 26 Defining Privacy for Weighted Votes, Single and Multi-voter Coercion
  28. Altmetric Badge
    Chapter 27 TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks
  29. Altmetric Badge
    Chapter 28 Introducing the gMix Open Source Framework for Mix Implementations
  30. Altmetric Badge
    Chapter 29 Secure and Efficient Outsourcing of Sequence Comparisons
  31. Altmetric Badge
    Chapter 30 Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
  32. Altmetric Badge
    Chapter 31 New Algorithms for Secure Outsourcing of Modular Exponentiations
  33. Altmetric Badge
    Chapter 32 Towards Symbolic Encryption Schemes
  34. Altmetric Badge
    Chapter 33 Decision Procedures for Simulatability
  35. Altmetric Badge
    Chapter 34 Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems
  36. Altmetric Badge
    Chapter 35 Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext
  37. Altmetric Badge
    Chapter 36 Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience
  38. Altmetric Badge
    Chapter 37 Unique Group Signatures
  39. Altmetric Badge
    Chapter 38 Relations among Notions of Privacy for RFID Authentication Protocols
  40. Altmetric Badge
    Chapter 39 PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation
  41. Altmetric Badge
    Chapter 40 Dismantling iClass and iClass Elite
  42. Altmetric Badge
    Chapter 41 Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms
  43. Altmetric Badge
    Chapter 42 Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
  44. Altmetric Badge
    Chapter 43 Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
  45. Altmetric Badge
    Chapter 44 On the Security of Password Manager Database Formats
  46. Altmetric Badge
    Chapter 45 Scalable Telemetry Classification for Automated Malware Detection
  47. Altmetric Badge
    Chapter 46 Abstraction-Based Malware Analysis Using Rewriting and Model Checking
  48. Altmetric Badge
    Chapter 47 Detecting Phishing Emails the Natural Language Way
  49. Altmetric Badge
    Chapter 48 JVM-Portable Sandboxing of Java’s Native Libraries
  50. Altmetric Badge
    Chapter 49 Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions
  51. Altmetric Badge
    Chapter 50 SocialImpact: Systematic Analysis of Underground Social Dynamics
Attention for Chapter 43: Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
Altmetric Badge

Citations

dimensions_citation
8 Dimensions

Readers on

mendeley
31 Mendeley