Computer Security - ESORICS 2025, Kartoniert / Broschiert
Computer Security - ESORICS 2025
- 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part II
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
- Verlag:
- Springer, 10/2025
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783032078902
- Artikelnummer:
- 12440015
- Umfang:
- 552 Seiten
- Gewicht:
- 826 g
- Maße:
- 235 x 155 mm
- Stärke:
- 30 mm
- Erscheinungstermin:
- 17.10.2025
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Weitere Ausgaben von Computer Security - ESORICS 2025 |
Preis |
|---|---|
| Buch, Kartoniert / Broschiert, Englisch | EUR 81,04* |
| Buch, Kartoniert / Broschiert, Englisch | EUR 81,04* |
Klappentext
.- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. .- Tetris! Traceable Extendable Threshold Ring Signatures and More. .- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. .- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. .- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. .- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. .- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. .- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. .- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. .- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. .- A post-quantum Distributed OPRF from the Legendre PRF. .- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. .- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. .- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. .- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. .- Formalisation of KZG commitment schemes in EasyCrypt. .- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. .- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. .- Code Encryption with Intel TME-MK for Control-Flow Enforcement. .- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. .- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. .- Efficient Homomorphic Evaluation for Non-Polynomial Functions. .- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. .- Formally-verified Security against Forgery of Remote Attestation using SSProve. .- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. .- Extending Groth16 for Disjunctive Statements.