13. ESORICS 2008:
Málaga,
Spain
Sushil Jajodia, Javier López (Eds.):
Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings.
Lecture Notes in Computer Science 5283 Springer 2008, ISBN 978-3-540-88312-8
Intrusion Detection and Network Vulnerability Analysis
Network Security
Smart Cards and Identity Management
- Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs:
Dismantling MIFARE Classic.
97-114
- Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk:
A Browser-Based Kerberos Authentication Scheme.
115-129
- D. Nali, Paul C. van Oorschot:
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud.
130-145
Data and Applications Security
Privacy Enhancing Technologies
Anonymity and RFID Privacy
- Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Joan García-Haro:
A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks.
238-250
- Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini:
RFID Privacy Models Revisited.
251-266
- JungHoon Ha, Sang-Jae Moon, Jianying Zhou, JaeCheol Ha:
A New Formal Proof Model for RFID Location Privacy.
267-281
Access Control and Trust Negotiation
Information Flow and Non-transferability
Secure Electronic Voting and Web Applications Security
- David Lundin, Peter Y. A. Ryan:
Human Readable Paper Verification of Prêt à Voter.
379-395
- Carlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano:
A Distributed Implementation of the Certified Information Access Service.
396-410
- Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick:
Exploring User Reactions to New Browser Cues for Extended Validation Certificates.
411-427
- Claudia Díaz, Carmela Troncoso, Bart Preneel:
A Framework for the Analysis of Mix-Based Steganographic File Systems.
428-445
VoIP Security,
Malware,
and DRM
- Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis:
An Adaptive Policy-Based Approach to SPIT Management.
446-460
- Carlton R. Davis, Stephen Neville, José M. Fernandez, Jean-Marc Robert, John McHugh:
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
461-480
- Monirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee:
Eureka: A Framework for Enabling Static Malware Analysis.
481-500
- Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano:
New Considerations about the Correct Design of Turbo Fingerprinting Codes.
501-516
Formal Models and Cryptographic Protocols
Language-Based and Hardware Security
Copyright © Sun Mar 14 23:02:55 2010
by Michael Ley (ley@uni-trier.de)