Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10492)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ESORICS 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Similar content being viewed by others
Keywords
- Cryptographic applications
- formal security models
- authentication
- access control
- security protocols
- privacy preserving protocols
- embedded systems security
- web security
- intrusion detection
- mobile and wireless security
- cryptography
- data privacy
- software engineering
- semantics
- privacy
- internet
- public key cryptography
- programming languages
- algorithm analysis and problem complexity
Table of contents (28 papers)
Other volumes
-
Computer Security – ESORICS 2017
-
Computer Security – ESORICS 2017
Editors and Affiliations
Bibliographic Information
Book Title: Computer Security – ESORICS 2017
Book Subtitle: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I
Editors: Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-66402-6
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-66401-9Published: 15 August 2017
eBook ISBN: 978-3-319-66402-6Published: 01 September 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXI, 485
Number of Illustrations: 106 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Computers and Society, Legal Aspects of Computing