Computer security - ESORICS 2020 = 2...
European Symposium on Research in Computer Security (2020 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Computer security - ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.. Part I /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Computer security - ESORICS 2020/ edited by Liqun Chen ... [et al.].
    Reminder of title: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.
    remainder title: ESORICS 2020
    other author: Chen, Liqun.
    corporate name: European Symposium on Research in Computer Security
    Published: Cham :Springer International Publishing : : 2020.,
    Description: xxviii, 760 p. :ill., digital ;24 cm.
    [NT 15003449]: Database and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma - A Framework for Learning Attribute-based Access Control Policies -- A Framework for Evaluating Client Privacy Leakages in Federated Learning -- Network Security -- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation -- PGC: Decentralized Con dential Payment System with Auditability -- Secure Cloud Auditing with Efficient Ownership Transfer -- Privacy -- Encrypt-to-self: Securely Outsourcing Storage -- PGLP: Customizable and Rigorous Location Privacy through Policy Graph -- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party -- Password and Policy -- Distributed PCFG Password Cracking -- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage -- GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-58951-6
    ISBN: 9783030589516
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login