FEEDBACK Smiley face

Computer Security – ESORICS 2010 (Record no. 19322)

000 -LEADER
fixed length control field 06602nam a22006015i 4500
001 - CONTROL NUMBER
control field 978-3-642-15497-3
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170515111738.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100901s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642154973
-- 978-3-642-15497-3
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-15497-3
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.5-5105.9
072 #7 - SUBJECT CATEGORY CODE
Subject category code UKN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM075000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 23
245 10 - TITLE STATEMENT
Title Computer Security – ESORICS 2010
Medium [electronic resource] :
Remainder of title 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings /
Statement of responsibility, etc edited by Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
300 ## - PHYSICAL DESCRIPTION
Extent XIV, 718 p. 163 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 6345
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note RFID and Privacy -- A New Framework for RFID Privacy -- Readers Behaving Badly -- Privacy-Preserving, Taxable Bank Accounts -- Formal Analysis of Privacy for Vehicular Mix-Zones -- Software Security -- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time -- A Theory of Runtime Enforcement, with Results -- Enforcing Secure Object Initialization in Java -- Flexible Scheduler-Independent Security -- Cryptographic Protocols -- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic -- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ?-Protocols -- Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model -- DR@FT: Efficient Remote Attestation Framework for Dynamic Systems -- Traffic Analysis -- Website Fingerprinting and Identification Using Ordered Feature Sequences -- Web Browser History Detection as a Real-World Privacy Threat -- On the Secrecy of Spread-Spectrum Flow Watermarks -- Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation -- End-User Security -- A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection -- Kamouflage: Loss-Resistant Password Management -- Formal Analysis -- Sequential Protocol Composition in Maude-NPA -- Verifying Security Property of Peer-to-Peer Systems Using CSP -- Modeling and Analyzing Security in the Presence of Compromising Adversaries -- On Bounding Problems of Quantitative Information Flow -- E-voting and Broadcast -- On E-Vote Integrity in the Case of Malicious Voter Computers -- Election Verifiability in Electronic Voting Protocols -- Pretty Good Democracy for More Expressive Voting Schemes -- Efficient Multi-dimensional Key Management in Broadcast Services -- Authentication, Access Control, Authorization and Attestation -- Caught in the Maze of Security Standards -- User-Role Reachability Analysis of Evolving Administrative Role Based Access Control -- An Authorization Framework Resilient to Policy Evaluation Failures -- Optimistic Fair Exchange with Multiple Arbiters -- Anonymity and Unlinkability -- Speaker Recognition in Encrypted Voice Streams -- Evaluating Adversarial Partitions -- Providing Mobile Users’ Anonymity in Hybrid Networks -- Complexity of Anonymity for Security Protocols -- Network Security and Economics -- k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks -- Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information -- RatFish: A File Sharing Protocol Provably Secure against Rational Users -- A Service Dependency Model for Cost-Sensitive Intrusion Response -- Secure Update, DOS and Intrustion Detection -- Secure Code Update for Embedded Devices via Proofs of Secure Erasure -- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks -- Low-Cost Client Puzzles Based on Modular Exponentiation -- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.
520 ## - SUMMARY, ETC.
Summary, etc The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was also organized to arrive at the ?nal decision. As a result of the review process, 42 papers were selected for the ?nal program, resulting in an - ceptance rate of as low as 21%. The authors of accepted papers were requested to revise their papers, based on the comments received. The program was c- pleted with an invited talk by Udo Helmbrecht, Executive Director of ENISA (European Network and Information Security Agency). ESORICS 2010 was organized under the aegisof three Ministries of the G- ernment of Greece, namely: (a) the Ministry of Infrastructure, Transport, and Networks, (b) the General Secretariat for Information Systems of the Ministry of Economy and Finance, and (c) the General Secretariat for e-Governance of the Ministry of Interior, Decentralization, and e-Government.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer programming.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithms.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and civilization.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management information systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Programming Techniques.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management of Computing and Information Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and Society.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gritzalis, Dimitris.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Preneel, Bart.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Theoharidou, Marianthi.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642154966
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 0302-9743 ;
Volume number/sequential designation 6345
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-15497-3
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type e-Book

No items available.


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in