The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was also organized to arrive at the ?nal decision. As a result of the review process, 42 papers were selected for the ?nal program, resulting in an - ceptance rate of as low as 21%. The authors of accepted papers were requested to revise their papers, based on the comments received. The program was c- pleted with an invited talk by Udo Helmbrecht, Executive Director of ENISA (European Network and Information Security Agency). ESORICS 2010 was organized under the aegisof three Ministries of the G- ernment of Greece, namely: (a) the Ministry of Infrastructure, Transport, and Networks, (b) the General Secretariat for Information Systems of the Ministry of Economy and Finance, and (c) the General Secretariat for e-Governance of the Ministry of Interior, Decentralization, and e-Government.
Author(s): Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao (auth.), Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou (eds.)
Series: Lecture Notes in Computer Science 6345 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 718
Tags: Computer Communication Networks; Management of Computing and Information Systems; Data Encryption; Algorithm Analysis and Problem Complexity; Computers and Society; Information Systems Applications (incl.Internet)
Front Matter....Pages -
A New Framework for RFID Privacy....Pages 1-18
Readers Behaving Badly....Pages 19-36
Privacy-Preserving, Taxable Bank Accounts....Pages 37-54
Formal Analysis of Privacy for Vehicular Mix-Zones....Pages 55-70
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time....Pages 71-86
A Theory of Runtime Enforcement, with Results....Pages 87-100
Enforcing Secure Object Initialization in Java....Pages 101-115
Flexible Scheduler-Independent Security....Pages 116-133
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic....Pages 134-150
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols....Pages 151-167
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model....Pages 168-181
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems....Pages 182-198
Website Fingerprinting and Identification Using Ordered Feature Sequences....Pages 199-214
Web Browser History Detection as a Real-World Privacy Threat....Pages 215-231
On the Secrecy of Spread-Spectrum Flow Watermarks....Pages 232-248
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation....Pages 249-267
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection....Pages 268-285
Kamouflage: Loss-Resistant Password Management....Pages 286-302
Sequential Protocol Composition in Maude-NPA....Pages 303-318
Verifying Security Property of Peer-to-Peer Systems Using CSP....Pages 319-339
Modeling and Analyzing Security in the Presence of Compromising Adversaries....Pages 340-356
On Bounding Problems of Quantitative Information Flow....Pages 357-372
On E-Vote Integrity in the Case of Malicious Voter Computers....Pages 373-388
Election Verifiability in Electronic Voting Protocols....Pages 389-404
Pretty Good Democracy for More Expressive Voting Schemes....Pages 405-423
Efficient Multi-dimensional Key Management in Broadcast Services....Pages 424-440
Caught in the Maze of Security Standards....Pages 441-454
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control....Pages 455-471
An Authorization Framework Resilient to Policy Evaluation Failures....Pages 472-487
Optimistic Fair Exchange with Multiple Arbiters....Pages 488-507
Speaker Recognition in Encrypted Voice Streams....Pages 508-523
Evaluating Adversarial Partitions....Pages 524-539
Providing Mobile Users’ Anonymity in Hybrid Networks....Pages 540-557
Complexity of Anonymity for Security Protocols....Pages 558-572
k -Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks....Pages 573-587
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information....Pages 588-606
RatFish: A File Sharing Protocol Provably Secure against Rational Users....Pages 607-625
A Service Dependency Model for Cost-Sensitive Intrusion Response....Pages 626-642
Secure Code Update for Embedded Devices via Proofs of Secure Erasure....Pages 643-662
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks....Pages 663-678
Low-Cost Client Puzzles Based on Modular Exponentiation....Pages 679-697
Expressive, Efficient and Obfuscation Resilient Behavior Based IDS....Pages 698-715
Back Matter....Pages -