Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II: Lecture Notes in Computer Science, cartea 13555
Editat de Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Mengen Limba Engleză Paperback – 23 sep 2022
Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;
Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (3) | 337.66 lei 43-57 zile | |
| Springer Nature Switzerland – 23 sep 2022 | 337.66 lei 43-57 zile | |
| Springer Nature Switzerland – 24 sep 2022 | 344.30 lei 43-57 zile | |
| Springer International Publishing – 25 sep 2022 | 588.01 lei 43-57 zile |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 337.66 lei
Preț vechi: 422.08 lei
-20%
Puncte Express: 506
Preț estimativ în valută:
59.74€ • 70.43$ • 51.88£
59.74€ • 70.43$ • 51.88£
Carte tipărită la comandă
Livrare economică 23 martie-06 aprilie
Specificații
ISBN-13: 9783031171451
ISBN-10: 3031171454
Pagini: 741
Ilustrații: XXII, 741 p. 88 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.93 kg
Ediția:1st ed. 2022
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031171454
Pagini: 741
Ilustrații: XXII, 741 p. 88 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.93 kg
Ediția:1st ed. 2022
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Anonymity.- A Machine Learning Approach to Detect Differential Treatment of Anonymous Users.- Utility-Preserving Biometric Information Anonymization.- Anonymous Traceback for End-to-End Encryption.- Cloud Security.- Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay.- Lighter Is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.- Verifying the Quality of Outsourced Training on Clouds.- SecQuant: Quantifying Container System Call Exposure.- Dynamic Process Isolation.- Access Control.- Administration of Machine Learning Based Access Control.- Real-time Policy Enforcement with Metric First-Order Temporal Logic.- A Tale of Four Gates — Privilege Escalation and Permission Bypasses on Android through App Components.- Authentication.- Sequential Digital Signatures for Cryptographic Software-Update Authentication.- On Committing Authenticated Encryption.- Quantum-Resistant Password Based Threshold Single-Sign-On Authentication with Updatable Server Private Key.- The Revenge of Password Crackers: Automated Training of Password Cracking Tools.- Fuzzy Authenticated Key Exchange with Tight Security.- Continuous Authentication in Secure Messaging.- Digital Signatures.- Half-Aggregation of Schnorr Signatures with Tight Reductions.- Ring Signatures with User-Controlled Linkability.- DualDory: Logarithmic-verifier linkable ring signatures through preprocessing.- Effcient Unique Ring Signatures From Lattices.- Kiyomoto Verifiable Timed Linkable Ring Signatures For Scalable Payments for Monero.- Deterministic Wallets for Adaptor Signatures.- Puncturable Signature: A Generic Construction and Instantiations.- IoT Security.- fASLR: Function-Based ASLR for Resource-Constrained IoT Systems.- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.- IoTEnsemble: Detection of Botnet Attacks on Internet of Things.- IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps.- No-Label User-Level Membership Inference for ASR Model Auditing.- Applications.- A toolbox for verifiable tally-hiding e-voting systems.- How to Verifiably Encrypt Many Bits for an Election.- A framework for constructing Single Secret Leader Election from MPC.- AppBastion: Protection from Untrusted Apps and OSes on ARM.- Collaborative anomaly detection system for charging stations.