語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer security - ESORICS 2022 = 2...
~
European Symposium on Research in Computer Security (2022 :)
FindBook
Google Book
Amazon
博客來
Computer security - ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.. Part III /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Computer security - ESORICS 2022/ edited by Vijayalakshmi Atluri ... [et al.].
其他題名:
27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.
其他作者:
Atluri, Vijay.
團體作者:
European Symposium on Research in Computer Security
出版者:
Cham :Springer Nature Switzerland : : 2022.,
面頁冊數:
xxiii, 789 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Formal Analysis -- A Formal Analysis of the FIDO2 Protocols -- Composable Security Treatment of ECVRF and Batch Verifications -- Effcient Proofs of Knowledge for Threshold Relations -- A tale of two models: formal verification of KEMTLS via Tamarin -- Web Security -- Browser-based CPU Fingerprinting -- Polymorphic Protocols at the Example of Mitigating Web Bots -- Unlinkable Delegation of WebAuthn Credentials -- Large Scale Analysis of DoH Deployment on the Internet -- Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations -- Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names -- Hardware Security -- CPU Port Contention Without SMT -- Protocols for a Two-Tiered Trusted Computing Base -- Using Memristor Arrays as Physical Unclonable Functions -- Multiparty Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique Multi-Party Computations Composed of Two-Party Computations -- PEA: Practical Private Epistasis Analysis using MPC -- ML Techniques -- Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems -- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices -- Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses -- FLMJR: Improving Robustness of Federated Learning via Model Stability -- MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding -- Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning -- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) -- Cyber-Physical Systems Security -- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems -- A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator -- From Click To Sink: utilizing AIS for command and control in maritime cyber attacks -- Effcient Hash-Based Redactable Signature for Smart Grid Applications -- Can Industrial Intrusion Detection Be SIMPLE -- For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection -- Towards Effcient Auditing for Real-Time Systems -- Network and Software Security -- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks -- PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks -- Detecting Cross-Language Memory Management Issues in Rust -- Reach Me if You Can: On Native Vulnerability Reachability in Android Apps -- Extensible Virtual Call Integrity -- Posters -- Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords -- A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation -- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet -- MixCT: Mixing Confidential Transactions from Homomorphic Commitment -- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python -- The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-17143-7
ISBN:
9783031171437
Computer security - ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.. Part III /
Computer security - ESORICS 2022
27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.Part III /[electronic resource] :edited by Vijayalakshmi Atluri ... [et al.]. - Cham :Springer Nature Switzerland :2022. - xxiii, 789 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,135560302-9743 ;. - Lecture notes in computer science ;13556..
Formal Analysis -- A Formal Analysis of the FIDO2 Protocols -- Composable Security Treatment of ECVRF and Batch Verifications -- Effcient Proofs of Knowledge for Threshold Relations -- A tale of two models: formal verification of KEMTLS via Tamarin -- Web Security -- Browser-based CPU Fingerprinting -- Polymorphic Protocols at the Example of Mitigating Web Bots -- Unlinkable Delegation of WebAuthn Credentials -- Large Scale Analysis of DoH Deployment on the Internet -- Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations -- Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names -- Hardware Security -- CPU Port Contention Without SMT -- Protocols for a Two-Tiered Trusted Computing Base -- Using Memristor Arrays as Physical Unclonable Functions -- Multiparty Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique Multi-Party Computations Composed of Two-Party Computations -- PEA: Practical Private Epistasis Analysis using MPC -- ML Techniques -- Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems -- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices -- Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses -- FLMJR: Improving Robustness of Federated Learning via Model Stability -- MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding -- Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning -- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) -- Cyber-Physical Systems Security -- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems -- A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator -- From Click To Sink: utilizing AIS for command and control in maritime cyber attacks -- Effcient Hash-Based Redactable Signature for Smart Grid Applications -- Can Industrial Intrusion Detection Be SIMPLE -- For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection -- Towards Effcient Auditing for Real-Time Systems -- Network and Software Security -- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks -- PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks -- Detecting Cross-Language Memory Management Issues in Rust -- Reach Me if You Can: On Native Vulnerability Reachability in Android Apps -- Extensible Virtual Call Integrity -- Posters -- Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords -- A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation -- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet -- MixCT: Mixing Confidential Transactions from Homomorphic Commitment -- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python -- The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
ISBN: 9783031171437
Standard No.: 10.1007/978-3-031-17143-7doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / E87 2022
Dewey Class. No.: 005.82
Computer security - ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.. Part III /
LDR
:05345nmm a2200361 a 4500
001
2303967
003
DE-He213
005
20220923052404.0
006
m d
007
cr nn 008maaau
008
230409s2022 sz s 0 eng d
020
$a
9783031171437
$q
(electronic bk.)
020
$a
9783031171420
$q
(paper)
024
7
$a
10.1007/978-3-031-17143-7
$2
doi
035
$a
978-3-031-17143-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
E87 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
E89 2022
111
2
$a
European Symposium on Research in Computer Security
$n
(27th :
$d
2022 :
$c
Copenhagen, Denmark ; Online)
$3
3605740
245
1 0
$a
Computer security - ESORICS 2022
$h
[electronic resource] :
$b
27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.
$n
Part III /
$c
edited by Vijayalakshmi Atluri ... [et al.].
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2022.
300
$a
xxiii, 789 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13556
505
0
$a
Formal Analysis -- A Formal Analysis of the FIDO2 Protocols -- Composable Security Treatment of ECVRF and Batch Verifications -- Effcient Proofs of Knowledge for Threshold Relations -- A tale of two models: formal verification of KEMTLS via Tamarin -- Web Security -- Browser-based CPU Fingerprinting -- Polymorphic Protocols at the Example of Mitigating Web Bots -- Unlinkable Delegation of WebAuthn Credentials -- Large Scale Analysis of DoH Deployment on the Internet -- Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations -- Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names -- Hardware Security -- CPU Port Contention Without SMT -- Protocols for a Two-Tiered Trusted Computing Base -- Using Memristor Arrays as Physical Unclonable Functions -- Multiparty Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique Multi-Party Computations Composed of Two-Party Computations -- PEA: Practical Private Epistasis Analysis using MPC -- ML Techniques -- Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems -- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices -- Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses -- FLMJR: Improving Robustness of Federated Learning via Model Stability -- MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding -- Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning -- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) -- Cyber-Physical Systems Security -- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems -- A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator -- From Click To Sink: utilizing AIS for command and control in maritime cyber attacks -- Effcient Hash-Based Redactable Signature for Smart Grid Applications -- Can Industrial Intrusion Detection Be SIMPLE -- For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection -- Towards Effcient Auditing for Real-Time Systems -- Network and Software Security -- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks -- PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks -- Detecting Cross-Language Memory Management Issues in Rust -- Reach Me if You Can: On Native Vulnerability Reachability in Android Apps -- Extensible Virtual Call Integrity -- Posters -- Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords -- A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation -- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet -- MixCT: Mixing Confidential Transactions from Homomorphic Commitment -- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python -- The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models.
520
$a
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Special Purpose and Application-Based Systems.
$3
892492
650
2 4
$a
Computer System Implementation.
$3
892710
700
1
$a
Atluri, Vijay.
$3
907609
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13556.
$3
3605770
856
4 0
$u
https://doi.org/10.1007/978-3-031-17143-7
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9445516
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 E87 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入