posted by system || 10528 views || tracked by 32 users: [display]

ESORICS 2010 : 15th European Symposium on Research in Computer Security


Conference Series : European Symposium on Research in Computer Security
When Sep 20, 2010 - Sep 22, 2010
Where Athens, Greece
Submission Deadline Apr 7, 2010
Notification Due Jun 10, 2010
Final Version Due Jun 30, 2010
Categories    security

Call For Papers


registration now open!!!! (early bird deadline July 1)

15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010


ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing together
researchers in this area, by promoting the exchange of ideas with system
developers and by encouraging links with researchers in related areas.

Progressively organized in a series of European countries, the symposium
is confirmed as the European research event in computer security.

The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance


Registration information is available at:

Early registration fees apply, from now until July 1.

(listed alphabetically)

- Privacy-Preserving, Taxable Bank Accounts
(Androulaki, Elli; Vo, Binh; Bellovin, Steven)

- Speaker Recognition in Encrypted Voice Streams
(Backes, Michael; Koepf, Boris; Duermuth, Markus; Doychev, Goran)

- Efficient Multi-Dimensional Key Management in Broadcast Services
(Blanton, Marina; Frikken, Keith)

- Kamouflage: Loss-Resistant Password Management
(Bojinov, Hristo; Boneh, Dan; Bursztein, Elie; Boyen, Xavier)

- Traffic Analysis Against Low-Latency Anonymity Networks Using
Available Bandwidth Estimation
(Chakravarty, Sambuddho; Keromytis, Angelos D.; Stavrou, Angelos)

- Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information
(Christin, Nicolas; Chuang, John; Johnson, Benjamin;
Grossklags, Jens)

- RatFish: A File Sharing Protocol Provably Secure
Against Rational Users
(Ciobotaru, Oana-Madalina; Backes, Michael; Krohmer, Anton)

- Modeling and Analyzing Security in the Presence of
Compromising Adversaries
(Cremers, Cas; Basin, David)

- Formal Analysis of Privacy for Vehicular Mix-Zones
(Dahl, Morten; Delaune, Stephanie; Steel, Graham)

- Verifying Security Property of Peer-to-Peer Systems Using CSP
(Dinh, Tien Tuan Anh; Ryan, Mark)

- Enforcing Secure Object Initialization in Java
(Hubert, Laurent; Monfort, Vincent; Pichardie, David;
Jensen, Thomas)

- An Authorization Framework Resilient to Policy Evaluation Failures
(Huth, Michael; Crampton, Jason)

- Web Browser History Detection as a Real-World Privacy Threat
(Janc, Artur; Olejnik, Lukasz)

- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
(Kapravelos, Alexandros; Markatos, Evangelos P.; Polakis, Iasonas;
Ioannidis, Sotiris; Athanasopoulos, Elias)

- Low-Cost Client Puzzles based on Modular Exponentiation
(Karame, Ghassan; Capkun, Srdjan)

- A Comprehensive Approach for Cost-Sensitive Intrusion Response
(Kheir, Nizar; Cuppens, Nora; Cuppens, Frederic; Debar, Herve)

- Election Verifiability in Electronic Voting Protocols
(Kremer, Steve; Smyth, Ben; Ryan, Mark)

- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge
based on S-Protocols
(Krenn, Stephan; Barbosa, Manuel; Schneider, Thomas;
Bangerter, Endre; Sadeghi, Ahmad-Reza; Almeida, Jose Bacelar)

- Optimistic Fair Exchange with Multiple Arbiters
(Kupcu, Alptekin; Lysyanskaya, Anna)

- A New Framework for RFID Privacy
(Li, Yingjiu; Zhao, Yunlei; Yung, Moti; Deng, Robert)

- A Theory of Runtime Enforcement, with Results
(Ligatti, Jay; Reddy, Srikar)

- On E-Vote Integrity in the Case of Malicious Voter Computers
(Lipmaa, Helger; Van Laenen, Filip; Heiberg, Sven)

- Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model
(Liu, Joseph; Au, Man Ho; Susilo, Willy; Zhou, Jianying)

- Website Fingerprinting And Identification Using Ordered
Feature Sequences
(Lu, Liming; Chang, Ee-Chien; Chan, Mun Choon)

- On the Secrecy of Spread-Spectrum Flow Watermarks
(Luo, Xiapu; Zhang, Junjie; Lee, Wenke)

- Sequential Protocol Composition in Maude-NPA
(Meadows, Catherine; Meseguer, Jose; Escobar, Santiago;
Santiago, Sonia)

- Caught in the Maze of Security Standards
(Meier, Jan; Gollmann, Dieter)

- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
(Octavian, Catrina; de Hoogh, Sebastiaan)

- Evaluating Adversarial Partitions
(Pashalidis, Andreas; Schiffner, Stefan)

- Providing Mobile Users' Anonymity in Hybrid Networks
(Ardagna, Claudio; Jajodia, Sushil; Samarati, Pierangela
Stavrou, Angelos)

- Flexible Scheduler-Independent Security
(Sudbrock, Henning; Mantel, Heiko)

- Pretty Good Democracy for More Expressive Voting Schemes
(Teague, Vanessa; Ryan, Peter Y.A.; Heather, James)

- Complexity of Anonymity for Security Protocols
(Tiplea, Ferucio Laurentiu; Vamanu, Loredana; Varlan, Cosmin)

- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS
(Tokhtabayev, Arnur; Skormin, Victor; Dolgikh, Andrey)

- Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
(Uzun, Ersin; Nithyanand, Rishab; Tsudik, Gene)

- k-Zero Day Safety: Measuring the Security Risk of Networks against
Unknown Attacks
(Wang, Lingyu; Jajodia, Sushil; Singhal, Anoop; Noel, Steven)

- A Hierarchical Adaptive Probabilistic Approach for Zero Hour
Phish Detection
(Xiang, Guang; Rose, Carolyn; Hong, Jason; Pendleton, Bryan)

- DR@FT: Efficient Remote Attestation Framework for Dynamics Systems
(Xu, Wenjuan; Ahn, Gail-Joon; Hu, Hongxin; Zhang, Xinwen;
Seifert, Jean-Pierre)

- On Bounding Problems of Quantitative Information Flow
(Yasuoka, Hirotoshi; Terauchi, Tachio)

- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time
(Zhang, Chao; Zou, Wei; Wei, Tao; Wang, Tielei; Cheng, Yu)


Additional information about the conference can be found at:

Related Resources

EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
ECEL 2023   22nd European Conference on e-Learning
CMC 2023   9th International Conference on Control, Modeling and Computing
ECIE 2023   18th European Conference on Innovation and Entrepreneurship
SIGML 2023   4th International Conference on Signal Processing and Machine Learning
ICCDA--Ei 2023   2023 The 7th International Conference on Computing and Data Analysis (ICCDA 2023)
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
RTME 2023   8th International Conference on Recent Trends in Mechanical Engineering
ESORICS 2022   27th European Symposium on Research in Computer Security (ESORICS)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA