Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part IIThe two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Computer Security - ESORICS 2014: 19th European Symposium on ..., Part 2 Miroslaw Kutylowski,Jaideep Vaidya No preview available - 2014 |
Computer Security - Esorics 2014: 19th European Symposium on ..., Part 2 Miroslaw Kutylowski,Jaideep Vaidya No preview available - 2014 |
Common terms and phrases
access structure adversary aggregator algorithm application attacks attribute-based encryption attributes authentication ballot Bitcoin botnet browser ciphertext click fraud clickbots client CoinShuffle commitment scheme component Computer construction control flow CP-ABE credentials data of interest data structures decryption defined denote detection distribution efficient EUROCRYPT evaluation execution files filtering function hash Heidelberg hypervisor identity-based encryption IEEE implementation injection input kernel key exchange leakage LeakWatch LNCS malicious malware memory graph min-entropy module MtGox nodes NORX OpenSSL oracle participant password path signatures performance phase privacy-preserving private key proof proposed public key query random RootkitDet rootkits SCADA scheme secret key Section server SIGPATH simulator snapshots Springer SQLite subset target techniques traffic traitor tracing transaction valid variables vector verifiability zero-knowledge proof ZKPPC


