Limit search to available items
Record 3 of 12
Previous Record Next Record
Book Cover
E-book
Author European Symposium on Research in Computer Security (20th : 2015 : Vienna, Austria)

Title Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings. Part II / Günther Pernul, Peter Y A Ryan, Edgar Weippl (eds.)
Published Cham : Springer, 2015

Copies

Description 1 online resource (xvii, 665 pages) : color illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 9327
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 9327. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Foreword; Organization; Contents -- Part II; Contents -- Part I; Privacy; FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting; 1 Introduction; 2 Related Work; 2.1 Fingerprinting; 2.2 Countermeasures; 3 Determining the Fingerprint Surface; 3.1 Limitations of Preventing Fingerprint Tracking; 3.2 Fingerprint Vectors; 3.3 Fingerprint Surface; 4 Design; 4.1 Balancing Usability vs. Privacy; 4.2 Generating Web Identities; 5 Development and Implementation; 5.1 Development; 5.2 Implementation; 6 Experiments and Validation; 7 Conclusions; References
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections1 Introduction; 2 Background and Adversary Model; 2.1 IME and Personalized User Dictionary; 2.2 Adversary Model; 3 Vulnerability Analysis; 3.1 Android KeyEvent Processing Flow; 3.2 Cross-App KeyEvent Injection Vulnerability; 4 Attack; 4.1 Enumerating Entries from Dictionary; 4.2 Attack in Stealthy Mode; 4.3 Case Study of IMEs for Non-Latin Languages; 5 Evaluation; 5.1 Scope of Attack; 5.2 Experiment on Word Completion Attack Mode; 5.3 Experiment on Next-Word Prediction Attack Mode; 6 Defense; 7 Related Works; 8 Conclusion
2 Related Work3 System Model and Privacy Goals; 3.1 Network Abstraction; 3.2 Training Goal; 3.3 Prediction Goal; 4 Methodology; 4.1 ADMM; 4.2 Two-Tier Training; 4.3 Complexity Analysis; 4.4 Protecting Prior Knowledge; 5 Experimentation and Evaluation; 5.1 Wikipedia RfA Dataset; 5.2 Experimental Setup; 5.3 Evaluation Metrics; 5.4 Results; 6 Conclusion; A Appendix: Link Reconstruction Attack; A.1 Experimental Setup; A.2 Results; References; Privacy-Preserving Observation in Public Spaces; 1 Introduction; 2 Related Work; 2.1 Privacy-Preserving Billing; 2.2 Threat Model; 3 Collusion Attack
3.1 Model3.2 Collusion Strategy; 3.3 Analysis; 4 Privacy-Preserving Spot Checking; 4.1 Setup and Registration; 4.2 Security Properties; 4.3 Protocol; 4.4 Optimization; 4.5 Efficiency Analysis; 4.6 Rate Limiting; 4.7 Disposal; 5 Example Application; 6 Conclusions; A Privacy vs. Penalty Analysis; A.1 Variables; A.2 Analysis; References; Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions; 1 Introduction; 1.1 State-of-the-Art; 1.2 Our Contribution; 1.3 Organization; 2 Analysis of JPH Protocols; 2.1 Preliminary of JPH Protocols; 2.2 JPH Online Protocol
Summary The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security
Notes English
Subject Computer security -- Congresses
Computer science.
Computer security
Data encryption (Computer science)
Algorithms.
Computers and civilization.
Management information systems.
Electronic Data Processing
Computer Security
Algorithms
Management Information Systems
algorithms.
Algorithms
Computer science
Computer security
Computers and civilization
Data encryption (Computer science)
Management information systems
Genre/Form dictionaries.
proceedings (reports)
Dictionaries
Conference papers and proceedings
Dictionaries.
Conference papers and proceedings.
Dictionnaires.
Actes de congrès.
Form Electronic book
Author Pernul, Günther, 1961- editor.
Ryan, Peter, 1957- editor
Weippl, Edgar R., editor.
ISBN 9783319241777
331924177X
Other Titles ESORICS 2015