| |||||||||||||||
ESORICS 2010 : 15th European Symposium on Research in Computer SecurityConference Series : European Symposium on Research in Computer Security | |||||||||||||||
Link: http://www.esorics2010.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CALL FOR PARTICIPATION
registration now open!!!! (early bird deadline July 1) *********************************************************************** 15th European Symposium on Research in Computer Security Hotel AMARILIA, Vouliagmeni, Athens, Greece 20-22 September 2010 www.esorics2010.org *********************************************************************** ABOUT THE CONFERENCE ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. Progressively organized in a series of European countries, the symposium is confirmed as the European research event in computer security. The Symposium is under the aegis of the Greek: * Ministry of of Infrastructure, Transport and Networks * Ministry of Economy and Finance: General Secretariat for Information Systems * Ministry of Interior, Decentralization and e-Government: General Secretariat for Electronic Governance REGISTRATION Registration information is available at: https://www.triaenatours.gr/esorics.php Early registration fees apply, from now until July 1. LIST OF ACCEPTED PAPERS (listed alphabetically) - Privacy-Preserving, Taxable Bank Accounts (Androulaki, Elli; Vo, Binh; Bellovin, Steven) - Speaker Recognition in Encrypted Voice Streams (Backes, Michael; Koepf, Boris; Duermuth, Markus; Doychev, Goran) - Efficient Multi-Dimensional Key Management in Broadcast Services (Blanton, Marina; Frikken, Keith) - Kamouflage: Loss-Resistant Password Management (Bojinov, Hristo; Boneh, Dan; Bursztein, Elie; Boyen, Xavier) - Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation (Chakravarty, Sambuddho; Keromytis, Angelos D.; Stavrou, Angelos) - Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information (Christin, Nicolas; Chuang, John; Johnson, Benjamin; Grossklags, Jens) - RatFish: A File Sharing Protocol Provably Secure Against Rational Users (Ciobotaru, Oana-Madalina; Backes, Michael; Krohmer, Anton) - Modeling and Analyzing Security in the Presence of Compromising Adversaries (Cremers, Cas; Basin, David) - Formal Analysis of Privacy for Vehicular Mix-Zones (Dahl, Morten; Delaune, Stephanie; Steel, Graham) - Verifying Security Property of Peer-to-Peer Systems Using CSP (Dinh, Tien Tuan Anh; Ryan, Mark) - Enforcing Secure Object Initialization in Java (Hubert, Laurent; Monfort, Vincent; Pichardie, David; Jensen, Thomas) - An Authorization Framework Resilient to Policy Evaluation Failures (Huth, Michael; Crampton, Jason) - Web Browser History Detection as a Real-World Privacy Threat (Janc, Artur; Olejnik, Lukasz) - D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks (Kapravelos, Alexandros; Markatos, Evangelos P.; Polakis, Iasonas; Ioannidis, Sotiris; Athanasopoulos, Elias) - Low-Cost Client Puzzles based on Modular Exponentiation (Karame, Ghassan; Capkun, Srdjan) - A Comprehensive Approach for Cost-Sensitive Intrusion Response (Kheir, Nizar; Cuppens, Nora; Cuppens, Frederic; Debar, Herve) - Election Verifiability in Electronic Voting Protocols (Kremer, Steve; Smyth, Ben; Ryan, Mark) - A Certifying Compiler for Zero-Knowledge Proofs of Knowledge based on S-Protocols (Krenn, Stephan; Barbosa, Manuel; Schneider, Thomas; Bangerter, Endre; Sadeghi, Ahmad-Reza; Almeida, Jose Bacelar) - Optimistic Fair Exchange with Multiple Arbiters (Kupcu, Alptekin; Lysyanskaya, Anna) - A New Framework for RFID Privacy (Li, Yingjiu; Zhao, Yunlei; Yung, Moti; Deng, Robert) - A Theory of Runtime Enforcement, with Results (Ligatti, Jay; Reddy, Srikar) - On E-Vote Integrity in the Case of Malicious Voter Computers (Lipmaa, Helger; Van Laenen, Filip; Heiberg, Sven) - Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model (Liu, Joseph; Au, Man Ho; Susilo, Willy; Zhou, Jianying) - Website Fingerprinting And Identification Using Ordered Feature Sequences (Lu, Liming; Chang, Ee-Chien; Chan, Mun Choon) - On the Secrecy of Spread-Spectrum Flow Watermarks (Luo, Xiapu; Zhang, Junjie; Lee, Wenke) - Sequential Protocol Composition in Maude-NPA (Meadows, Catherine; Meseguer, Jose; Escobar, Santiago; Santiago, Sonia) - Caught in the Maze of Security Standards (Meier, Jan; Gollmann, Dieter) - Secure Multiparty Linear Programming Using Fixed-Point Arithmetic (Octavian, Catrina; de Hoogh, Sebastiaan) - Evaluating Adversarial Partitions (Pashalidis, Andreas; Schiffner, Stefan) - Providing Mobile Users' Anonymity in Hybrid Networks (Ardagna, Claudio; Jajodia, Sushil; Samarati, Pierangela Stavrou, Angelos) - Flexible Scheduler-Independent Security (Sudbrock, Henning; Mantel, Heiko) - Pretty Good Democracy for More Expressive Voting Schemes (Teague, Vanessa; Ryan, Peter Y.A.; Heather, James) - Complexity of Anonymity for Security Protocols (Tiplea, Ferucio Laurentiu; Vamanu, Loredana; Varlan, Cosmin) - Expressive, Efficient and Obfuscation Resilient Behavior Based IDS (Tokhtabayev, Arnur; Skormin, Victor; Dolgikh, Andrey) - Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems (Uzun, Ersin; Nithyanand, Rishab; Tsudik, Gene) - k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks (Wang, Lingyu; Jajodia, Sushil; Singhal, Anoop; Noel, Steven) - A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection (Xiang, Guang; Rose, Carolyn; Hong, Jason; Pendleton, Bryan) - DR@FT: Efficient Remote Attestation Framework for Dynamics Systems (Xu, Wenjuan; Ahn, Gail-Joon; Hu, Hongxin; Zhang, Xinwen; Seifert, Jean-Pierre) - On Bounding Problems of Quantitative Information Flow (Yasuoka, Hirotoshi; Terauchi, Tachio) - IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time (Zhang, Chao; Zou, Wei; Wei, Tao; Wang, Tielei; Cheng, Yu) MORE INFORMATION Additional information about the conference can be found at: www.esorics2010.org |
|