CALL FOR PARTICIPATION
registration now open!!!! (early bird deadline July 1)
***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************
ABOUT THE CONFERENCE
ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing together
researchers in this area, by promoting the exchange of ideas with system
developers and by encouraging links with researchers in related areas.
Progressively organized in a series of European countries, the symposium
is confirmed as the European research event in computer security.
The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance
REGISTRATION
Registration information is available at:
https://www.triaenatours.gr/esorics.php
Early registration fees apply, from now until July 1.
LIST OF ACCEPTED PAPERS
(listed alphabetically)
- Privacy-Preserving, Taxable Bank Accounts
(Androulaki, Elli; Vo, Binh; Bellovin, Steven)
- Speaker Recognition in Encrypted Voice Streams
(Backes, Michael; Koepf, Boris; Duermuth, Markus; Doychev, Goran)
- Efficient Multi-Dimensional Key Management in Broadcast Services
(Blanton, Marina; Frikken, Keith)
- Kamouflage: Loss-Resistant Password Management
(Bojinov, Hristo; Boneh, Dan; Bursztein, Elie; Boyen, Xavier)
- Traffic Analysis Against Low-Latency Anonymity Networks Using
Available Bandwidth Estimation
(Chakravarty, Sambuddho; Keromytis, Angelos D.; Stavrou, Angelos)
- Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information
(Christin, Nicolas; Chuang, John; Johnson, Benjamin;
Grossklags, Jens)
- RatFish: A File Sharing Protocol Provably Secure
Against Rational Users
(Ciobotaru, Oana-Madalina; Backes, Michael; Krohmer, Anton)
- Modeling and Analyzing Security in the Presence of
Compromising Adversaries
(Cremers, Cas; Basin, David)
- Formal Analysis of Privacy for Vehicular Mix-Zones
(Dahl, Morten; Delaune, Stephanie; Steel, Graham)
- Verifying Security Property of Peer-to-Peer Systems Using CSP
(Dinh, Tien Tuan Anh; Ryan, Mark)
- Enforcing Secure Object Initialization in Java
(Hubert, Laurent; Monfort, Vincent; Pichardie, David;
Jensen, Thomas)
- An Authorization Framework Resilient to Policy Evaluation Failures
(Huth, Michael; Crampton, Jason)
- Web Browser History Detection as a Real-World Privacy Threat
(Janc, Artur; Olejnik, Lukasz)
- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
(Kapravelos, Alexandros; Markatos, Evangelos P.; Polakis, Iasonas;
Ioannidis, Sotiris; Athanasopoulos, Elias)
- Low-Cost Client Puzzles based on Modular Exponentiation
(Karame, Ghassan; Capkun, Srdjan)
- A Comprehensive Approach for Cost-Sensitive Intrusion Response
(Kheir, Nizar; Cuppens, Nora; Cuppens, Frederic; Debar, Herve)
- Election Verifiability in Electronic Voting Protocols
(Kremer, Steve; Smyth, Ben; Ryan, Mark)
- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge
based on S-Protocols
(Krenn, Stephan; Barbosa, Manuel; Schneider, Thomas;
Bangerter, Endre; Sadeghi, Ahmad-Reza; Almeida, Jose Bacelar)
- Optimistic Fair Exchange with Multiple Arbiters
(Kupcu, Alptekin; Lysyanskaya, Anna)
- A New Framework for RFID Privacy
(Li, Yingjiu; Zhao, Yunlei; Yung, Moti; Deng, Robert)
- A Theory of Runtime Enforcement, with Results
(Ligatti, Jay; Reddy, Srikar)
- On E-Vote Integrity in the Case of Malicious Voter Computers
(Lipmaa, Helger; Van Laenen, Filip; Heiberg, Sven)
- Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model
(Liu, Joseph; Au, Man Ho; Susilo, Willy; Zhou, Jianying)
- Website Fingerprinting And Identification Using Ordered
Feature Sequences
(Lu, Liming; Chang, Ee-Chien; Chan, Mun Choon)
- On the Secrecy of Spread-Spectrum Flow Watermarks
(Luo, Xiapu; Zhang, Junjie; Lee, Wenke)
- Sequential Protocol Composition in Maude-NPA
(Meadows, Catherine; Meseguer, Jose; Escobar, Santiago;
Santiago, Sonia)
- Caught in the Maze of Security Standards
(Meier, Jan; Gollmann, Dieter)
- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
(Octavian, Catrina; de Hoogh, Sebastiaan)
- Evaluating Adversarial Partitions
(Pashalidis, Andreas; Schiffner, Stefan)
- Proving Mobile Users' Anonymity in Hybrid Networks
(Ardagna, Claudio; Jajodia, Sushil; Samarati, Pierangela
Stavrou, Angelos)
- Flexible Scheduler-Independent Security
(Sudbrock, Henning; Mantel, Heiko)
- Pretty Good Democracy for More Expressive Voting Schemes
(Teague, Vanessa; Ryan, Peter Y.A.; Heather, James)
- Complexity of Anonymity for Security Protocols
(Tiplea, Ferucio Laurentiu; Vamanu, Loredana; Varlan, Cosmin)
- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS
(Tokhtabayev, Arnur; Skormin, Victor; Dolgikh, Andrey)
- Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
(Uzun, Ersin; Nithyanand, Rishab; Tsudik, Gene)
- k-Zero Day Safety: Measuring the Security Risk of Networks against
Unknown Attacks
(Wang, Lingyu; Jajodia, Sushil; Singhal, Anoop; Noel, Steven)
- A Hierarchical Adaptive Probabilistic Approach for Zero Hour
Phish Detection
(Xiang, Guang; Rose, Carolyn; Hong, Jason; Pendleton, Bryan)
- DR@FT: Efficient Remote Attestation Framework for Dynamics Systems
(Xu, Wenjuan; Ahn, Gail-Joon; Hu, Hongxin; Zhang, Xinwen;
Seifert, Jean-Pierre)
- On Bounding Problems of Quantitative Information Flow
(Yasuoka, Hirotoshi; Terauchi, Tachio)
- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time
(Zhang, Chao; Zou, Wei; Wei, Tao; Wang, Tielei; Cheng, Yu)
MORE INFORMATION
Additional information about the conference can be found at:
www.esorics2010.org
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments:
Post a Comment