Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I: Lecture Notes in Computer Science, cartea 12308
Editat de Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneideren Limba Engleză Paperback – 12 sep 2020
The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 343.05 lei 6-8 săpt. | |
| Springer International Publishing – 12 sep 2020 | 343.05 lei 6-8 săpt. | |
| Springer International Publishing – 13 sep 2020 | 343.05 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 343.05 lei
Preț vechi: 428.80 lei
-20%
Puncte Express: 515
Preț estimativ în valută:
60.64€ • 71.81$ • 52.83£
60.64€ • 71.81$ • 52.83£
Carte tipărită la comandă
Livrare economică 02-16 aprilie
Specificații
ISBN-13: 9783030589509
ISBN-10: 3030589501
Pagini: 718
Ilustrații: XXVIII, 760 p. 637 illus., 141 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.08 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030589501
Pagini: 718
Ilustrații: XXVIII, 760 p. 637 illus., 141 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.08 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Database and Web Security.- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.- Bulwark: Holistic and Verified Security Monitoring of Web Protocols.- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.- Software Security.- Follow the blue bird: A study on threat data published on Twitter.- Dynamic and Secure Memory Transformation in Userspace.- Understanding the Security Risks of Docker Hub.- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon.- Software Security.- Similarity of Binaries across Optimization Levels and Obfuscations.- HART: Hardware-assisted Kernel Module Tracing on Arm.- Zipper Stack: Shadow Stacks Without Shadow.- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening.- LegIoT: Ledgered Trust Management Platform for IoT.- Machine Learning Security.- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference.- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES.- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems.- Machine Learning Security.- Data Poisoning Attacks Against Federated Learning Systems.- Interpretable Probabilistic Password Strength Meters via Deep Learning.- Polisma - A Framework for Learning Attribute-based Access Control Policies.- A Framework for Evaluating Client Privacy Leakages in Federated Learning.- Network Security.- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.- PGC: Decentralized Con dential Payment System with Auditability.- Secure Cloud Auditing with Efficient Ownership Transfer.- Privacy.- Encrypt-to-self: Securely Outsourcing Storage.- PGLP: Customizable and Rigorous Location Privacy through Policy Graph.- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party.- Password and Policy.- Distributed PCFG Password Cracking.- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage.- GDPR - Challenges for Reconciling Legal Rules with Technical Reality.