Computer Security - ESORICS 2025, Kartoniert / Broschiert
Computer Security - ESORICS 2025
- 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part IV
 
(soweit verfügbar beim Lieferanten)
- Herausgeber:
 - Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
 - Verlag:
 - Springer, 10/2025
 - Einband:
 - Kartoniert / Broschiert
 - Sprache:
 - Englisch
 - ISBN-13:
 - 9783032079008
 - Artikelnummer:
 - 12439717
 - Umfang:
 - 476 Seiten
 - Gewicht:
 - 715 g
 - Maße:
 - 235 x 155 mm
 - Stärke:
 - 26 mm
 - Erscheinungstermin:
 - 12.10.2025
 - Hinweis
 - 
                                                                                                                
Achtung: Artikel ist nicht in deutscher Sprache! 
Weitere Ausgaben von Computer Security - ESORICS 2025 | 
                Preis | 
|---|
Klappentext
.- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. .- Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. .- Functional Credentials: a Practical Construction for the European Digital Identity. .- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. .- Breaking verifiability and vote privacy in CHVote. .- Zero-Click SnailLoad: From Minimal to No User Interaction. .- Analysis of input-output mappings in coinjoin transactions with arbitrary values. .- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. .- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. .- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. .- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. .- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. .- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. .- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. .- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. .- Efficient and Secure Sleepy Model for BFT Consensus. .- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. .- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. .- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. .- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. .- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. .- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.