did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642154966

Computer Security - ESORICS 2010 : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

by ; ;
  • ISBN13:

    9783642154966

  • ISBN10:

    3642154964

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-11-09
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $159.00 Save up to $125.59
  • Digital
    $72.39
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010.The 42 papers included in the book were carefully reviewed and selected from 201 papers. The articles are organized in topical sections on RFID and Privacy, Software Security, Cryptographic Protocols, Traffic Analysis, End-User Security, Formal Analysis, E-voting and Broadcast, Authentication, Access Control, Authorization and Attestation, Anonymity and Unlinkability, Network Security and Economics, as well as Secure Update, DOS and Intrustion Detection.

Table of Contents

RFID and Privacy
A New Framework for RFID Privacyp. 1
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systemsp. 19
Privacy-Preserving, Taxable Bank Accountsp. 37
Formal Analysis of Privacy for Vehicular Mix-Zonesp. 55
Software Security
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Timep. 71
A Theory of Runtime Enforcement, with Resultsp. 87
Enforcing Secure Object Initialization in Javap. 101
Flexible Scheduler-Independent Securityp. 116
Cryptographic Protocols
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ¿-Protocols
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Modelp. 168
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems
Traffic Analysis
Website Fingerprinting and Identification Using Ordered Feature Sequencesp. 199
Web Browser History Detection as a Real-World Privacy Threatp. 215
On the Secrecy of Spread-Spectrum Flow Watermarksp. 232
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimationp. 249
End-User Security
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detectionp. 268
Kamouflage: Loss-Resistant Password Managementp. 286
Formal Analysis
Sequential Protocol Composition in Maude-NPAp. 303
Verifying Security Property of Peer-to-Peer Systems Using CSPp. 319
Modeling and Analyzing Security in the Presence of Compromising Adversariesp. 340
On Bounding Problems of Quantitative Information Flowp. 357
E-voting and Broadcast
On E-Vote Integrity in the Case of Malicious Voter Computersp. 373
Election Verifiability in Electronic Voting Protocolsp. 389
Pretty Good Democracy for More Expressive Voting Schemesp. 405
Efficient Multi-dimensional Key Management in Broadcast Servicesp. 424
Authentication, Access Control, Authorization and Attestation
Caught in the Maze of Security Standardsp. 441
User-Role Reachability Analysis of Evolving Administrative Role Based Access Controlp. 455
An Authorization Framework Resilient to Policy Evaluation Failuresp. 472
Optimistic Fair Exchange with Multiple Arbitersp. 488
Anonymity and Unlinkability
Speaker Recognition in Encrypted Voice Streamsp. 508
Evaluating Adversarial Partitionsp. 524
Providing Mobile Users' Anonymity in Hybrid Networksp. 540
Complexity of Anonymity for Security Protocolsp. 558
Network Security and Economics
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacksp. 573
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Informationp. 588
RatFish: A File Sharing Protocol Provably Secure against Rational Usersp. 607
A Service Dependency Model for Cost-Sensitive Intrusion Responsep. 626
Secure Update, DOS and Intrustion Detection
Secure Code Update for Embedded Devices via Proofs of Secure Erasurep. 643
Dial
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program