17. ESORICS 2012: Pisa, Italy

Security and Data Protection in Real Systems

Formal Models for Cryptography and Access Control

Security and Privacy in Mobile and Wireless Networks

Counteracting Man-in-the-Middle Attacks

Network Security

Users Privacy and Anonymity

Location Privacy

Voting Protocols and Anonymous Communication

Private Computation in Cloud Systems

Formal Security Models

Identity Based Encryption and Group Signature

Authentication

Encryption Key and Password Security

Malware and Phishing

Software Security