Computer security - ESORICS 2022 = 2...
European Symposium on Research in Computer Security (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Computer security - ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Computer security - ESORICS 2022/ edited by Vijayalakshmi Atluri ... [et al.].
    Reminder of title: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.
    other author: Atluri, Vijayalakshmi.
    corporate name: European Symposium on Research in Computer Security
    Published: Cham :Springer Nature Switzerland : : 2022.,
    Description: xxii, 741 p. :ill. (chiefly color), digital ;24 cm.
    [NT 15003449]: Anonymity -- A Machine Learning Approach to Detect Differential Treatment of Anonymous Users -- Utility-Preserving Biometric Information Anonymization -- Anonymous Traceback for End-to-End Encryption -- Cloud Security -- Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost -- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay -- Lighter Is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption -- Verifying the Quality of Outsourced Training on Clouds -- SecQuant: Quantifying Container System Call Exposure -- Dynamic Process Isolation -- Access Control -- Administration of Machine Learning Based Access Control -- Real-time Policy Enforcement with Metric First-Order Temporal Logic -- A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android through App Components -- Authentication -- Sequential Digital Signatures for Cryptographic Software-Update Authentication -- On Committing Authenticated Encryption -- Quantum-Resistant Password Based Threshold Single-Sign-On Authentication with Updatable Server Private Key -- The Revenge of Password Crackers: Automated Training of Password Cracking Tools -- Fuzzy Authenticated Key Exchange with Tight Security -- Continuous Authentication in Secure Messaging -- Digital Signatures -- Half-Aggregation of Schnorr Signatures with Tight Reductions -- Ring Signatures with User-Controlled Linkability -- DualDory: Logarithmic-verifier linkable ring signatures through preprocessing -- Effcient Unique Ring Signatures From Lattices -- Kiyomoto Verifiable Timed Linkable Ring Signatures For Scalable Payments for Monero -- Deterministic Wallets for Adaptor Signatures -- Puncturable Signature: A Generic Construction and Instantiations -- IoT Security -- fASLR: Function-Based ASLR for Resource-Constrained IoT Systems -- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks -- IoTEnsemble: Detection of Botnet Attacks on Internet of Things -- IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps -- No-Label User-Level Membership Inference for ASR Model Auditing -- Applications -- A toolbox for verifiable tally-hiding e-voting systems -- How to Verifiably Encrypt Many Bits for an Election -- A framework for constructing Single Secret Leader Election from MPC -- AppBastion: Protection from Untrusted Apps and OSes on ARM -- Collaborative anomaly detection system for charging stations.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-17146-8
    ISBN: 9783031171468
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9445508 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 E87 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login