Computer security - ESORICS 2022 = 2...
European Symposium on Research in Computer Security (2022 :)

FindBook      Google Book      Amazon      博客來     
  • Computer security - ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.. Part I /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Computer security - ESORICS 2022/ edited by Vijayalakshmi Atluri ... [et al.].
    其他題名: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022 : proceedings.
    其他作者: Atluri, Vijay.
    團體作者: European Symposium on Research in Computer Security
    出版者: Cham :Springer International Publishing : : 2022.,
    面頁冊數: xxxvii, 723 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Blockchain Security -- A Blockchain-based Long-Term Time-Stamping Scheme -- Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain -- Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and love the Fork -- Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers -- Secure Hierarchical Deterministic Wallet Supporting Stealth Address -- Zero-Knowledge Age Restriction for GNU Taler -- Privacy -- Privacy Leakage in Privacy-Preserving Neural Network Inference -- Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences -- One vote is enough for analysing privacy -- Local Differential Privacy for Federated Learning -- XSPIR: Effcient Symmetrically Private Information Retrieval from Ring-LWE -- Scaling Up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic -- Crypto -- Generic Construction of Trace-and-Revoke Inner Product Functional Encryption -- Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More -- Public Key Authenticated Encryption with Keyword Search from LWE -- An Effcient Query Recovery Attack Against a Graph Encryption Scheme -- New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead -- A Formal Model for Credential Hopping Attacks -- No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent -- Effcient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts -- Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability -- Attacks -- Kallima: A Clean-label Framework for Textual Backdoor Attacks -- Two Types of Novel DoS Attacks against CDNs Based on HTTP/2 Flow Control Mechanism -- EVExchange: A Relay Attack on Electric Vehicle Charging System -- Turrin Smart RPKI Validation: Avoiding Errors and Preventing Hijacks -- Cyber Network Resilience against Self-Propagating Malware Attacks -- INC: In-Network Classification of Botnet Propagation at Line Rate -- GAME: Generative-Based Adaptive Model Extraction Attack -- AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports -- SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection -- Sidechannels We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys -- VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents -- Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange -- BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-17140-6
    ISBN: 9783031171406
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9445519 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 E87 2022 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入