×

Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. (English) Zbl 1492.68027

Lecture Notes in Computer Science 9327. Cham: Springer (ISBN 978-3-319-24176-0/pbk; 978-3-319-24177-7/ebook). xvii, 665 p. (2015).

Show indexed articles as search result.

The articles of mathematical interest will be reviewed individually. For the preceding symposium see [Zbl 1477.68021; Zbl 1477.68022]. For Part I of the proceedings of the present symposium see [Zbl 1492.68028].
Indexed articles:
Zhang, Liang Feng; Safavi-Naini, Reihaneh, Batch verifiable computation of polynomials on outsourced data, 167-185 [Zbl 1522.68093]
Almousa, Omar; Mödersheim, Sebastian; Modesti, Paolo; Viganò, Luca, Typing and compositionality for security protocols: a generalization to the geometric fragment, 209-229 [Zbl 1499.68043]
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie, Checking trace equivalence: how to get rid of nonces?, 230-251 [Zbl 1499.68048]
Tran Viet Xuan Phuong; Yang, Guomin; Susilo, Willy; Chen, Xiaofeng, Attribute based broadcast encryption with short ciphertext and decryption key, 252-269 [Zbl 1499.94051]
Li, Ximeng; Nielson, Flemming; Riis Nielson, Hanne, Factorization of behavioral integrity, 500-519 [Zbl 1499.68050]
Pulls, Tobias; Peeters, Roel, Balloon: a forward-secure append-only persistent authenticated data structure, 622-641 [Zbl 1499.68056]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
68M25 Computer security
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI