↓ Skip to main content

Computer Security – ESORICS 2013

Overview of attention for book
Cover of 'Computer Security – ESORICS 2013'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits
  3. Altmetric Badge
    Chapter 2 Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤ n
  4. Altmetric Badge
    Chapter 3 Privacy-Preserving Accountable Computation
  5. Altmetric Badge
    Chapter 4 Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode
  6. Altmetric Badge
    Chapter 5 A Quantitative Evaluation of Privilege Separation in Web Browser Designs
  7. Altmetric Badge
    Chapter 6 Estimating Asset Sensitivity by Profiling Users
  8. Altmetric Badge
    Chapter 7 Practical Secure Logging: Seekable Sequential Key Generators
  9. Altmetric Badge
    Chapter 8 Request-Based Comparable Encryption
  10. Altmetric Badge
    Chapter 9 Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud
  11. Altmetric Badge
    Chapter 10 HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism
  12. Altmetric Badge
    Chapter 11 AnDarwin: Scalable Detection of Semantically Similar Android Applications
  13. Altmetric Badge
    Chapter 12 BISTRO: Binary Component Extraction and Embedding for Software Security Applications
  14. Altmetric Badge
    Chapter 13 Vulnerable Delegation of DNS Resolution
  15. Altmetric Badge
    Chapter 14 Formal Approach for Route Agility against Persistent Attackers
  16. Altmetric Badge
    Chapter 15 Plug-and-Play IP Security
  17. Altmetric Badge
    Chapter 16 Managing the Weakest Link
  18. Altmetric Badge
    Chapter 17 Automated Security Proofs for Almost-Universal Hash for MAC Verification
  19. Altmetric Badge
    Chapter 18 Bounded Memory Protocols and Progressing Collaborative Systems
  20. Altmetric Badge
    Chapter 19 Universally Composable Key-Management
  21. Altmetric Badge
    Chapter 20 A Cryptographic Analysis of OPACITY
  22. Altmetric Badge
    Chapter 21 Symbolic Probabilistic Analysis of Off-Line Guessing
  23. Altmetric Badge
    Chapter 22 Computer Security – ESORICS 2013
  24. Altmetric Badge
    Chapter 23 Efficient Privacy-Enhanced Familiarity-Based Recommender System
  25. Altmetric Badge
    Chapter 24 Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation
  26. Altmetric Badge
    Chapter 25 Privacy-Preserving Matching of Community-Contributed Content
  27. Altmetric Badge
    Chapter 26 Ballot Secrecy and Ballot Independence Coincide
  28. Altmetric Badge
    Chapter 27 Election Verifiability or Ballot Privacy: Do We Need to Choose?
  29. Altmetric Badge
    Chapter 28 Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
  30. Altmetric Badge
    Chapter 29 Mining Malware Specifications through Static Reachability Analysis
  31. Altmetric Badge
    Chapter 30 Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies
  32. Altmetric Badge
    Chapter 31 Measuring and Detecting Malware Downloads in Live Network Traffic
  33. Altmetric Badge
    Chapter 32 Automated Certification of Authorisation Policy Resistance
  34. Altmetric Badge
    Chapter 33 Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption
  35. Altmetric Badge
    Chapter 34 Purpose Restrictions on Information Use
  36. Altmetric Badge
    Chapter 35 Distributed Shuffling for Preserving Access Confidentiality
  37. Altmetric Badge
    Chapter 36 Range Extension Attacks on Contactless Smart Cards
  38. Altmetric Badge
    Chapter 37 CellFlood: Attacking Tor Onion Routers on the Cheap
  39. Altmetric Badge
    Chapter 38 Nowhere to Hide: Navigating around Privacy in Online Social Networks
  40. Altmetric Badge
    Chapter 39 Current Events: Identifying Webpages by Tapping the Electrical Outlet
  41. Altmetric Badge
    Chapter 40 Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
  42. Altmetric Badge
    Chapter 41 Data-Confined HTML5 Applications
  43. Altmetric Badge
    Chapter 42 KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks
  44. Altmetric Badge
    Chapter 43 Run-Time Enforcement of Information-Flow Properties on Android
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
patent
4 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
96 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer Security – ESORICS 2013
Published by
Springer, Berlin, Heidelberg, January 2013
DOI 10.1007/978-3-642-40203-6
ISBNs
978-3-64-240202-9, 978-3-64-240203-6
Editors

Jason Crampton, Sushil Jajodia, Keith Mayes

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 96 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 96 100%

Demographic breakdown

Readers by professional status Count As %
Other 1 1%
Lecturer > Senior Lecturer 1 1%
Unknown 94 98%
Readers by discipline Count As %
Computer Science 1 1%
Unknown 95 99%