Computer Security ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on securit...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Foresti Sara (Directeur de publication), Yung Moti (Directeur de publication), Martinelli Fabio (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Computer Security ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings / edited by Sara Foresti, Moti Yung, Fabio Martinelli.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2012
Cham : Springer Nature
Collection : Security and Cryptology ; 7459
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Sujets :
Documents associés : Autre format: Computer Security ESORICS 2012
Autre format: Computer Security -- ESORICS 2012
Description
Résumé : This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.
ISBN : 978-3-642-33167-1