Computer Security - ESORICS 2019 = 2...
European Symposium on Research in Computer Security (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Computer Security - ESORICS 2019 = 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Computer Security - ESORICS 2019/ edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan.
    Reminder of title: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019 : proceedings.
    remainder title: ESORICS 2019
    other author: Sako, Kazue.
    corporate name: European Symposium on Research in Computer Security
    Published: Cham :Springer International Publishing : : 2019.,
    Description: xxvi, 627 p. :ill., digital ;24 cm.
    [NT 15003449]: Software Security -- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs -- Uncovering Information Flow Policy Violations in C Programs -- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning -- Static Detection of Uninitialized Stack Variables in Binary Code -- Towards Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices -- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails -- Feistel Structures for MPC, and More -- Arithmetic Garbling from Bilinear Maps -- Security Models -- SEPD: An Access Control Model for Resource Sharing in an IoT Environment -- Nighthawk: Transparent System Introspection from Ring -3 -- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement -- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics -- Searchable Encryption -- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy -- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption -- Generic Multi-keyword Ranked Search on Encrypted Cloud Data -- An Efficiently Searchable Encrypted Data Structure for Range Queries -- Privacy -- GDPiRated - Stealing Personal Information On- and Offline -- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation -- OCRAM-assisted Sensitive Data Protection on ARM-based Platform -- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping -- Key Exchange Protocols -- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography -- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation -- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope -- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids -- Web Security -- The Risks of WebGL: Analysis, Evaluation and Detection -- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks -- Fingerprint Surface-Based Detection of Web Bot Detectors -- Testing for Integrity Flaws in Web Sessions.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-29962-0
    ISBN: 9783030299620
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9403849 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 E87 2019 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login