𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Computer Security – ESORICS 2012 Volume 7459 || On the Security of Password Manager Database Formats

✍ Scribed by Foresti, Sara; Yung, Moti; Martinelli, Fabio


Book ID
120737940
Publisher
Springer Berlin Heidelberg
Year
2012
Tongue
English
Weight
258 KB
Edition
1
Category
Article
ISBN
364233167X

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.


📜 SIMILAR VOLUMES


[Lecture Notes in Computer Science] Comp
✍ Foresti, Sara; Yung, Moti; Martinelli, Fabio 📂 Article 📅 2012 🏛 Springer Berlin Heidelberg 🌐 English ⚖ 737 KB

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on securit

[Lecture Notes in Computer Science] Comp
✍ Foresti, Sara; Yung, Moti; Martinelli, Fabio 📂 Article 📅 2012 🏛 Springer Berlin Heidelberg 🌐 English ⚖ 275 KB

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on securit