Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10493)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ESORICS 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Similar content being viewed by others
Keywords
- Cryptographic applications
- formal security models
- authentication
- access control
- security protocols
- privacy preserving protocols
- embedded systems security
- web security
- intrusion detection
- mobile and wireless security
- data security
- authentication
- computer crime
- software engineering
- cryptography
- privacy
- world wide web
- algorithm analysis and problem complexity
Table of contents (30 papers)
Other volumes
-
Computer Security – ESORICS 2017
-
Computer Security – ESORICS 2017
Editors and Affiliations
Bibliographic Information
Book Title: Computer Security – ESORICS 2017
Book Subtitle: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
Editors: Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-66399-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-66398-2Published: 15 August 2017
eBook ISBN: 978-3-319-66399-9Published: 01 September 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXI, 573
Number of Illustrations: 187 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Computers and Society, Software Engineering