Skip to main content
  • Conference proceedings
  • © 2015

Computer Security -- ESORICS 2015

20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9327)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

    Pages I-XVII
  2. Privacy

    1. Front Matter

      Pages 1-1
    2. FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting

      • Christof Ferreira Torres, Hugo Jonker, Sjouke Mauw
      Pages 3-19
    3. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections

      • Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, Zhou Li
      Pages 20-39
    4. Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records

      • Xingliang Yuan, Helei Cui, Xinyu Wang, Cong Wang
      Pages 40-60
    5. Privacy-Preserving Link Prediction in Decentralized Online Social Networks

      • Yao Zheng, Bing Wang, Wenjing Lou, Y. Thomas Hou
      Pages 61-80
    6. Privacy-Preserving Observation in Public Spaces

      • Florian Kerschbaum, Hoon Wei Lim
      Pages 81-100
  3. Cloud Security

    1. Front Matter

      Pages 121-121
    2. Rich Queries on Encrypted Data: Beyond Exact Matches

      • Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
      Pages 123-145
    3. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data

      • Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou
      Pages 146-166
    4. Batch Verifiable Computation of Polynomials on Outsourced Data

      • Liang Feng Zhang, Reihaneh Safavi-Naini
      Pages 167-185
    5. CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud

      • Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang
      Pages 186-205
  4. Protocols and Attribute-based Encryption

    1. Front Matter

      Pages 207-207
    2. Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment

      • Omar Almousa, Sebastian Mödersheim, Paolo Modesti, Luca Viganò
      Pages 209-229
    3. Checking Trace Equivalence: How to Get Rid of Nonces?

      • Rémy Chrétien, Véronique Cortier, Stéphanie Delaune
      Pages 230-251
    4. Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key

      • Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen
      Pages 252-269
  5. Code Analysis and Side-Channels

    1. Front Matter

      Pages 291-291
    2. DexHunter: Toward Extracting Hidden Code from Packed Android Applications

      • Yueqian Zhang, Xiapu Luo, Haoyang Yin
      Pages 293-311

Other Volumes

  1. Computer Security -- ESORICS 2015

About this book

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.

The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

Editors and Affiliations

  • University of Regensburg, Regensburg, Germany

    Günther Pernul

  • University of Luxembourg, Luxembourg, Luxembourg

    Peter Y A Ryan

  • SBA Research, Wien, Austria

    Edgar Weippl

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access