語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer Security – ESORICS 2020 = 2...
~
Li, Ninghui.
Computer Security – ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Computer Security – ESORICS 2020/ edited by Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider.
其他題名:
25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I /
其他作者:
Schneider, Steve.
面頁冊數:
XXVIII, 760 p. 637 illus., 141 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Software Engineering. -
電子資源:
https://doi.org/10.1007/978-3-030-58951-6
ISBN:
9783030589516
Computer Security – ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I /
Computer Security – ESORICS 2020
25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I /[electronic resource] :edited by Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider. - 1st ed. 2020. - XXVIII, 760 p. 637 illus., 141 illus. in color.online resource. - Security and Cryptology ;12308. - Security and Cryptology ;9241.
Database and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma - A Framework for Learning Attribute-based Access Control Policies -- A Framework for Evaluating Client Privacy Leakages in Federated Learning -- Network Security -- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation -- PGC: Decentralized Con dential Payment System with Auditability -- Secure Cloud Auditing with Efficient Ownership Transfer -- Privacy -- Encrypt-to-self: Securely Outsourcing Storage -- PGLP: Customizable and Rigorous Location Privacy through Policy Graph -- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party -- Password and Policy -- Distributed PCFG Password Cracking -- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage -- GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain. .
ISBN: 9783030589516
Standard No.: 10.1007/978-3-030-58951-6doiSubjects--Topical Terms:
669632
Software Engineering.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Computer Security – ESORICS 2020 = 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I /
LDR
:04595nam a22004215i 4500
001
1028790
003
DE-He213
005
20200911143758.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030589516
$9
978-3-030-58951-6
024
7
$a
10.1007/978-3-030-58951-6
$2
doi
035
$a
978-3-030-58951-6
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Computer Security – ESORICS 2020
$h
[electronic resource] :
$b
25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I /
$c
edited by Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XXVIII, 760 p. 637 illus., 141 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12308
505
0
$a
Database and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma - A Framework for Learning Attribute-based Access Control Policies -- A Framework for Evaluating Client Privacy Leakages in Federated Learning -- Network Security -- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation -- PGC: Decentralized Con dential Payment System with Auditability -- Secure Cloud Auditing with Efficient Ownership Transfer -- Privacy -- Encrypt-to-self: Securely Outsourcing Storage -- PGLP: Customizable and Rigorous Location Privacy through Policy Graph -- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party -- Password and Policy -- Distributed PCFG Password Cracking -- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage -- GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
520
$a
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain. .
650
2 4
$a
Software Engineering.
$3
669632
650
2 4
$a
Special Purpose and Application-Based Systems.
$3
669833
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Software engineering.
$3
562952
650
0
$a
Special purpose computers.
$3
1204562
650
0
$a
Application software.
$3
528147
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
700
1
$a
Schneider, Steve.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1077668
700
1
$a
Liang, Kaitai.
$e
editor.
$1
https://orcid.org/0000-0003-0262-7678
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317933
700
1
$a
Li, Ninghui.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1167054
700
1
$a
Chen, Liqun.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
679410
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030589509
776
0 8
$i
Printed edition:
$z
9783030589523
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-58951-6
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入