Pernul, Günther (ed.); Ryan, Peter Y A (ed.); Weippl, Edgar (ed.) Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. (English) Zbl 1492.68027 Lecture Notes in Computer Science 9327. Cham: Springer (ISBN 978-3-319-24176-0/pbk; 978-3-319-24177-7/ebook). xvii, 665 p. (2015). Show indexed articles as search result. The articles of mathematical interest will be reviewed individually. For the preceding symposium see [Zbl 1477.68021; Zbl 1477.68022]. For Part I of the proceedings of the present symposium see [Zbl 1492.68028].Indexed articles:Zhang, Liang Feng; Safavi-Naini, Reihaneh, Batch verifiable computation of polynomials on outsourced data, 167-185 [Zbl 1522.68093]Almousa, Omar; Mödersheim, Sebastian; Modesti, Paolo; Viganò, Luca, Typing and compositionality for security protocols: a generalization to the geometric fragment, 209-229 [Zbl 1499.68043]Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie, Checking trace equivalence: how to get rid of nonces?, 230-251 [Zbl 1499.68048]Tran Viet Xuan Phuong; Yang, Guomin; Susilo, Willy; Chen, Xiaofeng, Attribute based broadcast encryption with short ciphertext and decryption key, 252-269 [Zbl 1499.94051]Li, Ximeng; Nielson, Flemming; Riis Nielson, Hanne, Factorization of behavioral integrity, 500-519 [Zbl 1499.68050]Pulls, Tobias; Peeters, Roel, Balloon: a forward-secure append-only persistent authenticated data structure, 622-641 [Zbl 1499.68056] Cited in 3 Reviews MSC: 68-06 Proceedings, conferences, collections, etc. pertaining to computer science 68M25 Computer security 00B25 Proceedings of conferences of miscellaneous specific interest Citations:Zbl 1477.68021; Zbl 1477.68022; Zbl 1492.68028 × Cite Format Result Cite Review PDF Full Text: DOI