Computer Security - ESORICS 2022

Computer Security - ESORICS 2022

27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I

Di Pietro, Roberto; Meng, Weizhi; Jensen, Christian D.; Atluri, Vijayalakshmi

Springer International Publishing AG

09/2022

723

Mole

Inglês

9783031171390

15 a 20 dias

1135

Descrição não disponível.
Blockchain Security.- A Blockchain-based Long-Term Time-Stamping Scheme.- Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.- Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and love the Fork.- Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers.- Secure Hierarchical Deterministic Wallet Supporting Stealth Address.- Zero-Knowledge Age Restriction for GNU Taler.- Privacy.- Privacy Leakage in Privacy-Preserving Neural Network Inference.- Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences.- One vote is enough for analysing privacy.- Local Differential Privacy for Federated Learning.- XSPIR: Effcient Symmetrically Private Information Retrieval from Ring-LWE.- Scaling Up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic.- Crypto.- Generic Construction of Trace-and-Revoke Inner Product Functional Encryption.- Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.- Public Key Authenticated Encryption with Keyword Search from LWE.- An Effcient Query Recovery Attack Against a Graph Encryption Scheme.- New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.- A Formal Model for Credential Hopping Attacks.- No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent.- Effcient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts.- Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability.- Attacks.- Kallima: A Clean-label Framework for Textual Backdoor Attacks.- Two Types of Novel DoS Attacks against CDNs Based on HTTP/2 Flow Control Mechanism.- EVExchange: A Relay Attack on Electric Vehicle Charging System.- Turrin Smart RPKI Validation: Avoiding Errors and Preventing Hijacks.- Cyber Network Resilience against Self-Propagating Malware Attacks.- INC: In-Network Classification of Botnet Propagation at Line Rate.- GAME: Generative-Based Adaptive Model Extraction Attack.- AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.- SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.- Sidechannels We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys.- VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents.- Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange.- BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;artificial intelligence;authentication;computer crime;computer hardware;computer security;cryptography;data communication systems;data security;databases;engineering;internet;network protocols;network security;privacy;public key cryptography;security systems;signal processing;telecommunication networks;telecommunication systems