Computer Security - ESORICS 2025, Kartoniert / Broschiert
Computer Security - ESORICS 2025
- 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part IV
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
- Verlag:
- Springer, 10/2025
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783032079008
- Artikelnummer:
- 12439717
- Umfang:
- 476 Seiten
- Gewicht:
- 715 g
- Maße:
- 235 x 155 mm
- Stärke:
- 26 mm
- Erscheinungstermin:
- 12.10.2025
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Weitere Ausgaben von Computer Security - ESORICS 2025 |
Preis |
|---|---|
| Buch, Kartoniert / Broschiert, Englisch | EUR 81,04* |
Klappentext
.- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. .- Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. .- Functional Credentials: a Practical Construction for the European Digital Identity. .- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. .- Breaking verifiability and vote privacy in CHVote. .- Zero-Click SnailLoad: From Minimal to No User Interaction. .- Analysis of input-output mappings in coinjoin transactions with arbitrary values. .- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. .- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. .- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. .- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. .- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. .- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. .- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. .- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. .- Efficient and Secure Sleepy Model for BFT Consensus. .- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. .- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. .- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. .- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. .- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. .- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.