posted by system || 12241 views || tracked by 32 users: [display]

ESORICS 2010 : 15th European Symposium on Research in Computer Security

FacebookTwitterLinkedInGoogle


Conference Series : European Symposium on Research in Computer Security
 
Link: http://www.esorics2010.org
 
When Sep 20, 2010 - Sep 22, 2010
Where Athens, Greece
Submission Deadline Apr 7, 2010
Notification Due Jun 10, 2010
Final Version Due Jun 30, 2010
Categories    security
 

Call For Papers

CALL FOR PARTICIPATION

registration now open!!!! (early bird deadline July 1)

***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************

ABOUT THE CONFERENCE

ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing together
researchers in this area, by promoting the exchange of ideas with system
developers and by encouraging links with researchers in related areas.

Progressively organized in a series of European countries, the symposium
is confirmed as the European research event in computer security.

The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance


REGISTRATION

Registration information is available at:
https://www.triaenatours.gr/esorics.php

Early registration fees apply, from now until July 1.


LIST OF ACCEPTED PAPERS
(listed alphabetically)

- Privacy-Preserving, Taxable Bank Accounts
(Androulaki, Elli; Vo, Binh; Bellovin, Steven)

- Speaker Recognition in Encrypted Voice Streams
(Backes, Michael; Koepf, Boris; Duermuth, Markus; Doychev, Goran)

- Efficient Multi-Dimensional Key Management in Broadcast Services
(Blanton, Marina; Frikken, Keith)

- Kamouflage: Loss-Resistant Password Management
(Bojinov, Hristo; Boneh, Dan; Bursztein, Elie; Boyen, Xavier)

- Traffic Analysis Against Low-Latency Anonymity Networks Using
Available Bandwidth Estimation
(Chakravarty, Sambuddho; Keromytis, Angelos D.; Stavrou, Angelos)

- Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information
(Christin, Nicolas; Chuang, John; Johnson, Benjamin;
Grossklags, Jens)

- RatFish: A File Sharing Protocol Provably Secure
Against Rational Users
(Ciobotaru, Oana-Madalina; Backes, Michael; Krohmer, Anton)

- Modeling and Analyzing Security in the Presence of
Compromising Adversaries
(Cremers, Cas; Basin, David)

- Formal Analysis of Privacy for Vehicular Mix-Zones
(Dahl, Morten; Delaune, Stephanie; Steel, Graham)

- Verifying Security Property of Peer-to-Peer Systems Using CSP
(Dinh, Tien Tuan Anh; Ryan, Mark)

- Enforcing Secure Object Initialization in Java
(Hubert, Laurent; Monfort, Vincent; Pichardie, David;
Jensen, Thomas)

- An Authorization Framework Resilient to Policy Evaluation Failures
(Huth, Michael; Crampton, Jason)

- Web Browser History Detection as a Real-World Privacy Threat
(Janc, Artur; Olejnik, Lukasz)

- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
(Kapravelos, Alexandros; Markatos, Evangelos P.; Polakis, Iasonas;
Ioannidis, Sotiris; Athanasopoulos, Elias)

- Low-Cost Client Puzzles based on Modular Exponentiation
(Karame, Ghassan; Capkun, Srdjan)

- A Comprehensive Approach for Cost-Sensitive Intrusion Response
(Kheir, Nizar; Cuppens, Nora; Cuppens, Frederic; Debar, Herve)

- Election Verifiability in Electronic Voting Protocols
(Kremer, Steve; Smyth, Ben; Ryan, Mark)

- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge
based on S-Protocols
(Krenn, Stephan; Barbosa, Manuel; Schneider, Thomas;
Bangerter, Endre; Sadeghi, Ahmad-Reza; Almeida, Jose Bacelar)

- Optimistic Fair Exchange with Multiple Arbiters
(Kupcu, Alptekin; Lysyanskaya, Anna)

- A New Framework for RFID Privacy
(Li, Yingjiu; Zhao, Yunlei; Yung, Moti; Deng, Robert)

- A Theory of Runtime Enforcement, with Results
(Ligatti, Jay; Reddy, Srikar)

- On E-Vote Integrity in the Case of Malicious Voter Computers
(Lipmaa, Helger; Van Laenen, Filip; Heiberg, Sven)

- Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model
(Liu, Joseph; Au, Man Ho; Susilo, Willy; Zhou, Jianying)

- Website Fingerprinting And Identification Using Ordered
Feature Sequences
(Lu, Liming; Chang, Ee-Chien; Chan, Mun Choon)

- On the Secrecy of Spread-Spectrum Flow Watermarks
(Luo, Xiapu; Zhang, Junjie; Lee, Wenke)

- Sequential Protocol Composition in Maude-NPA
(Meadows, Catherine; Meseguer, Jose; Escobar, Santiago;
Santiago, Sonia)

- Caught in the Maze of Security Standards
(Meier, Jan; Gollmann, Dieter)

- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
(Octavian, Catrina; de Hoogh, Sebastiaan)

- Evaluating Adversarial Partitions
(Pashalidis, Andreas; Schiffner, Stefan)

- Providing Mobile Users' Anonymity in Hybrid Networks
(Ardagna, Claudio; Jajodia, Sushil; Samarati, Pierangela
Stavrou, Angelos)

- Flexible Scheduler-Independent Security
(Sudbrock, Henning; Mantel, Heiko)

- Pretty Good Democracy for More Expressive Voting Schemes
(Teague, Vanessa; Ryan, Peter Y.A.; Heather, James)

- Complexity of Anonymity for Security Protocols
(Tiplea, Ferucio Laurentiu; Vamanu, Loredana; Varlan, Cosmin)

- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS
(Tokhtabayev, Arnur; Skormin, Victor; Dolgikh, Andrey)

- Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
(Uzun, Ersin; Nithyanand, Rishab; Tsudik, Gene)

- k-Zero Day Safety: Measuring the Security Risk of Networks against
Unknown Attacks
(Wang, Lingyu; Jajodia, Sushil; Singhal, Anoop; Noel, Steven)

- A Hierarchical Adaptive Probabilistic Approach for Zero Hour
Phish Detection
(Xiang, Guang; Rose, Carolyn; Hong, Jason; Pendleton, Bryan)

- DR@FT: Efficient Remote Attestation Framework for Dynamics Systems
(Xu, Wenjuan; Ahn, Gail-Joon; Hu, Hongxin; Zhang, Xinwen;
Seifert, Jean-Pierre)

- On Bounding Problems of Quantitative Information Flow
(Yasuoka, Hirotoshi; Terauchi, Tachio)

- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time
(Zhang, Chao; Zou, Wei; Wei, Tao; Wang, Tielei; Cheng, Yu)



MORE INFORMATION

Additional information about the conference can be found at:
www.esorics2010.org

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
AGRIJ 2024   Agricultural Science: An International journal
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
ICCPS 2025   16th ACM/IEEE International Conference on Cyber-Physical Systems
ESORICS 2024   European Symposium on Research in Computer Security
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
FSTJ 2024   Food Science and Technology: An International Journal