posted by system || 6664 views || tracked by 32 users: [display]

ESORICS 2010 : 15th European Symposium on Research in Computer Security

FacebookTwitterLinkedInGoogle


Conference Series : European Symposium on Research in Computer Security
 
Link: http://www.esorics2010.org
 
When Sep 20, 2010 - Sep 22, 2010
Where Athens, Greece
Submission Deadline Apr 7, 2010
Notification Due Jun 10, 2010
Final Version Due Jun 30, 2010
Categories    security
 

Call For Papers

CALL FOR PARTICIPATION

registration now open!!!! (early bird deadline July 1)

***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************

ABOUT THE CONFERENCE

ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing together
researchers in this area, by promoting the exchange of ideas with system
developers and by encouraging links with researchers in related areas.

Progressively organized in a series of European countries, the symposium
is confirmed as the European research event in computer security.

The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance


REGISTRATION

Registration information is available at:
https://www.triaenatours.gr/esorics.php

Early registration fees apply, from now until July 1.


LIST OF ACCEPTED PAPERS
(listed alphabetically)

- Privacy-Preserving, Taxable Bank Accounts
(Androulaki, Elli; Vo, Binh; Bellovin, Steven)

- Speaker Recognition in Encrypted Voice Streams
(Backes, Michael; Koepf, Boris; Duermuth, Markus; Doychev, Goran)

- Efficient Multi-Dimensional Key Management in Broadcast Services
(Blanton, Marina; Frikken, Keith)

- Kamouflage: Loss-Resistant Password Management
(Bojinov, Hristo; Boneh, Dan; Bursztein, Elie; Boyen, Xavier)

- Traffic Analysis Against Low-Latency Anonymity Networks Using
Available Bandwidth Estimation
(Chakravarty, Sambuddho; Keromytis, Angelos D.; Stavrou, Angelos)

- Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information
(Christin, Nicolas; Chuang, John; Johnson, Benjamin;
Grossklags, Jens)

- RatFish: A File Sharing Protocol Provably Secure
Against Rational Users
(Ciobotaru, Oana-Madalina; Backes, Michael; Krohmer, Anton)

- Modeling and Analyzing Security in the Presence of
Compromising Adversaries
(Cremers, Cas; Basin, David)

- Formal Analysis of Privacy for Vehicular Mix-Zones
(Dahl, Morten; Delaune, Stephanie; Steel, Graham)

- Verifying Security Property of Peer-to-Peer Systems Using CSP
(Dinh, Tien Tuan Anh; Ryan, Mark)

- Enforcing Secure Object Initialization in Java
(Hubert, Laurent; Monfort, Vincent; Pichardie, David;
Jensen, Thomas)

- An Authorization Framework Resilient to Policy Evaluation Failures
(Huth, Michael; Crampton, Jason)

- Web Browser History Detection as a Real-World Privacy Threat
(Janc, Artur; Olejnik, Lukasz)

- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
(Kapravelos, Alexandros; Markatos, Evangelos P.; Polakis, Iasonas;
Ioannidis, Sotiris; Athanasopoulos, Elias)

- Low-Cost Client Puzzles based on Modular Exponentiation
(Karame, Ghassan; Capkun, Srdjan)

- A Comprehensive Approach for Cost-Sensitive Intrusion Response
(Kheir, Nizar; Cuppens, Nora; Cuppens, Frederic; Debar, Herve)

- Election Verifiability in Electronic Voting Protocols
(Kremer, Steve; Smyth, Ben; Ryan, Mark)

- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge
based on S-Protocols
(Krenn, Stephan; Barbosa, Manuel; Schneider, Thomas;
Bangerter, Endre; Sadeghi, Ahmad-Reza; Almeida, Jose Bacelar)

- Optimistic Fair Exchange with Multiple Arbiters
(Kupcu, Alptekin; Lysyanskaya, Anna)

- A New Framework for RFID Privacy
(Li, Yingjiu; Zhao, Yunlei; Yung, Moti; Deng, Robert)

- A Theory of Runtime Enforcement, with Results
(Ligatti, Jay; Reddy, Srikar)

- On E-Vote Integrity in the Case of Malicious Voter Computers
(Lipmaa, Helger; Van Laenen, Filip; Heiberg, Sven)

- Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model
(Liu, Joseph; Au, Man Ho; Susilo, Willy; Zhou, Jianying)

- Website Fingerprinting And Identification Using Ordered
Feature Sequences
(Lu, Liming; Chang, Ee-Chien; Chan, Mun Choon)

- On the Secrecy of Spread-Spectrum Flow Watermarks
(Luo, Xiapu; Zhang, Junjie; Lee, Wenke)

- Sequential Protocol Composition in Maude-NPA
(Meadows, Catherine; Meseguer, Jose; Escobar, Santiago;
Santiago, Sonia)

- Caught in the Maze of Security Standards
(Meier, Jan; Gollmann, Dieter)

- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
(Octavian, Catrina; de Hoogh, Sebastiaan)

- Evaluating Adversarial Partitions
(Pashalidis, Andreas; Schiffner, Stefan)

- Providing Mobile Users' Anonymity in Hybrid Networks
(Ardagna, Claudio; Jajodia, Sushil; Samarati, Pierangela
Stavrou, Angelos)

- Flexible Scheduler-Independent Security
(Sudbrock, Henning; Mantel, Heiko)

- Pretty Good Democracy for More Expressive Voting Schemes
(Teague, Vanessa; Ryan, Peter Y.A.; Heather, James)

- Complexity of Anonymity for Security Protocols
(Tiplea, Ferucio Laurentiu; Vamanu, Loredana; Varlan, Cosmin)

- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS
(Tokhtabayev, Arnur; Skormin, Victor; Dolgikh, Andrey)

- Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
(Uzun, Ersin; Nithyanand, Rishab; Tsudik, Gene)

- k-Zero Day Safety: Measuring the Security Risk of Networks against
Unknown Attacks
(Wang, Lingyu; Jajodia, Sushil; Singhal, Anoop; Noel, Steven)

- A Hierarchical Adaptive Probabilistic Approach for Zero Hour
Phish Detection
(Xiang, Guang; Rose, Carolyn; Hong, Jason; Pendleton, Bryan)

- DR@FT: Efficient Remote Attestation Framework for Dynamics Systems
(Xu, Wenjuan; Ahn, Gail-Joon; Hu, Hongxin; Zhang, Xinwen;
Seifert, Jean-Pierre)

- On Bounding Problems of Quantitative Information Flow
(Yasuoka, Hirotoshi; Terauchi, Tachio)

- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time
(Zhang, Chao; Zou, Wei; Wei, Tao; Wang, Tielei; Cheng, Yu)



MORE INFORMATION

Additional information about the conference can be found at:
www.esorics2010.org

Related Resources

ETHE Blearning 2017   Blended learning in higher education: research findings
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ACMC 2017   Australasian Computer Music Conference
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
eCrime 2018   13th Symposium on Electronic Crime Research
AI 2017   3rd International Conference on Artificial Intelligence and Applications