Coverart for item
The Resource Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Günther Pernul, Peter Y A Ryan, Edgar Weippl (eds.)

Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Günther Pernul, Peter Y A Ryan, Edgar Weippl (eds.)

Label
Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
Title
Computer Security -- ESORICS 2015
Title remainder
20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings
Title number
Part II
Statement of responsibility
Günther Pernul, Peter Y A Ryan, Edgar Weippl (eds.)
Title variation
ESORICS 2015
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security
Member of
Cataloging source
NUI
Dewey number
005.8
Illustrations
illustrations
Image bit depth
0
Index
no index present
Language note
English
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2015
http://bibfra.me/vocab/lite/meetingName
European Symposium on Research in Computer Security
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
  • 1961-
  • 1957-
http://library.link/vocab/relatedWorkOrContributorName
  • Pernul, Günther
  • Ryan, Peter
  • Weippl, Edgar R.
Series statement
  • Lecture Notes in Computer Science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
9327
http://library.link/vocab/subjectName
  • Computer security
  • Computer science
  • Computer security
  • Data encryption (Computer science)
  • Algorithms
  • Computers and civilization
  • Management information systems
  • Algorithms
  • Computer science
  • Computer security
  • Computers and civilization
  • Data encryption (Computer science)
  • Management information systems
  • Computer Science
  • Engineering & Applied Sciences
  • Computer Science
  • Systems and Data Security
  • Data Encryption
  • Management of Computing and Information Systems
  • Algorithm Analysis and Problem Complexity
  • Computers and Society
Label
Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Günther Pernul, Peter Y A Ryan, Edgar Weippl (eds.)
Link
https://ezproxy.lib.ou.edu/login?url=http://link.springer.com/10.1007/978-3-319-24177-7
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Foreword; Organization; Contents -- Part II; Contents -- Part I; Privacy; FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting; 1 Introduction; 2 Related Work; 2.1 Fingerprinting; 2.2 Countermeasures; 3 Determining the Fingerprint Surface; 3.1 Limitations of Preventing Fingerprint Tracking; 3.2 Fingerprint Vectors; 3.3 Fingerprint Surface; 4 Design; 4.1 Balancing Usability vs. Privacy; 4.2 Generating Web Identities; 5 Development and Implementation; 5.1 Development; 5.2 Implementation; 6 Experiments and Validation; 7 Conclusions; References
  • Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections1 Introduction; 2 Background and Adversary Model; 2.1 IME and Personalized User Dictionary; 2.2 Adversary Model; 3 Vulnerability Analysis; 3.1 Android KeyEvent Processing Flow; 3.2 Cross-App KeyEvent Injection Vulnerability; 4 Attack; 4.1 Enumerating Entries from Dictionary; 4.2 Attack in Stealthy Mode; 4.3 Case Study of IMEs for Non-Latin Languages; 5 Evaluation; 5.1 Scope of Attack; 5.2 Experiment on Word Completion Attack Mode; 5.3 Experiment on Next-Word Prediction Attack Mode; 6 Defense; 7 Related Works; 8 Conclusion
  • 2 Related Work3 System Model and Privacy Goals; 3.1 Network Abstraction; 3.2 Training Goal; 3.3 Prediction Goal; 4 Methodology; 4.1 ADMM; 4.2 Two-Tier Training; 4.3 Complexity Analysis; 4.4 Protecting Prior Knowledge; 5 Experimentation and Evaluation; 5.1 Wikipedia RfA Dataset; 5.2 Experimental Setup; 5.3 Evaluation Metrics; 5.4 Results; 6 Conclusion; A Appendix: Link Reconstruction Attack; A.1 Experimental Setup; A.2 Results; References; Privacy-Preserving Observation in Public Spaces; 1 Introduction; 2 Related Work; 2.1 Privacy-Preserving Billing; 2.2 Threat Model; 3 Collusion Attack
  • 3.1 Model3.2 Collusion Strategy; 3.3 Analysis; 4 Privacy-Preserving Spot Checking; 4.1 Setup and Registration; 4.2 Security Properties; 4.3 Protocol; 4.4 Optimization; 4.5 Efficiency Analysis; 4.6 Rate Limiting; 4.7 Disposal; 5 Example Application; 6 Conclusions; A Privacy vs. Penalty Analysis; A.1 Variables; A.2 Analysis; References; Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions; 1 Introduction; 1.1 State-of-the-Art; 1.2 Our Contribution; 1.3 Organization; 2 Analysis of JPH Protocols; 2.1 Preliminary of JPH Protocols; 2.2 JPH Online Protocol
Dimensions
unknown
Extent
1 online resource (xvii, 665 pages)
File format
multiple file formats
Form of item
online
Isbn
9783319241777
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
SpringerLink
Other control number
10.1007/978-3-319-24177-7
Other physical details
color illustrations.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)932169235
  • (OCoLC)ocn932169235
Label
Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Günther Pernul, Peter Y A Ryan, Edgar Weippl (eds.)
Link
https://ezproxy.lib.ou.edu/login?url=http://link.springer.com/10.1007/978-3-319-24177-7
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Foreword; Organization; Contents -- Part II; Contents -- Part I; Privacy; FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting; 1 Introduction; 2 Related Work; 2.1 Fingerprinting; 2.2 Countermeasures; 3 Determining the Fingerprint Surface; 3.1 Limitations of Preventing Fingerprint Tracking; 3.2 Fingerprint Vectors; 3.3 Fingerprint Surface; 4 Design; 4.1 Balancing Usability vs. Privacy; 4.2 Generating Web Identities; 5 Development and Implementation; 5.1 Development; 5.2 Implementation; 6 Experiments and Validation; 7 Conclusions; References
  • Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections1 Introduction; 2 Background and Adversary Model; 2.1 IME and Personalized User Dictionary; 2.2 Adversary Model; 3 Vulnerability Analysis; 3.1 Android KeyEvent Processing Flow; 3.2 Cross-App KeyEvent Injection Vulnerability; 4 Attack; 4.1 Enumerating Entries from Dictionary; 4.2 Attack in Stealthy Mode; 4.3 Case Study of IMEs for Non-Latin Languages; 5 Evaluation; 5.1 Scope of Attack; 5.2 Experiment on Word Completion Attack Mode; 5.3 Experiment on Next-Word Prediction Attack Mode; 6 Defense; 7 Related Works; 8 Conclusion
  • 2 Related Work3 System Model and Privacy Goals; 3.1 Network Abstraction; 3.2 Training Goal; 3.3 Prediction Goal; 4 Methodology; 4.1 ADMM; 4.2 Two-Tier Training; 4.3 Complexity Analysis; 4.4 Protecting Prior Knowledge; 5 Experimentation and Evaluation; 5.1 Wikipedia RfA Dataset; 5.2 Experimental Setup; 5.3 Evaluation Metrics; 5.4 Results; 6 Conclusion; A Appendix: Link Reconstruction Attack; A.1 Experimental Setup; A.2 Results; References; Privacy-Preserving Observation in Public Spaces; 1 Introduction; 2 Related Work; 2.1 Privacy-Preserving Billing; 2.2 Threat Model; 3 Collusion Attack
  • 3.1 Model3.2 Collusion Strategy; 3.3 Analysis; 4 Privacy-Preserving Spot Checking; 4.1 Setup and Registration; 4.2 Security Properties; 4.3 Protocol; 4.4 Optimization; 4.5 Efficiency Analysis; 4.6 Rate Limiting; 4.7 Disposal; 5 Example Application; 6 Conclusions; A Privacy vs. Penalty Analysis; A.1 Variables; A.2 Analysis; References; Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions; 1 Introduction; 1.1 State-of-the-Art; 1.2 Our Contribution; 1.3 Organization; 2 Analysis of JPH Protocols; 2.1 Preliminary of JPH Protocols; 2.2 JPH Online Protocol
Dimensions
unknown
Extent
1 online resource (xvii, 665 pages)
File format
multiple file formats
Form of item
online
Isbn
9783319241777
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
SpringerLink
Other control number
10.1007/978-3-319-24177-7
Other physical details
color illustrations.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)932169235
  • (OCoLC)ocn932169235

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...