語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer security - ESORICS 202025th...
~
(1998 :)
Computer security - ESORICS 202025th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.Part I /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Computer security - ESORICS 2020edited by Liqun Chen ... [et al.].
其他題名:
25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.
其他題名:
ESORICS 2020
其他作者:
Chen, Liqun.
團體作者:
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
xxviii, 760 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer securityCongresses.
電子資源:
https://doi.org/10.1007/978-3-030-58951-6
ISBN:
9783030589516$q(electronic bk.)
Computer security - ESORICS 202025th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.Part I /
Computer security - ESORICS 2020
25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.Part I /[electronic resource] :ESORICS 2020edited by Liqun Chen ... [et al.]. - Cham :Springer International Publishing :2020. - xxviii, 760 p. :ill., digital ;24 cm. - Lecture notes in computer science,123080302-9743 ;. - Lecture notes in computer science ;4891..
Database and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma - A Framework for Learning Attribute-based Access Control Policies -- A Framework for Evaluating Client Privacy Leakages in Federated Learning -- Network Security -- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation -- PGC: Decentralized Con dential Payment System with Auditability -- Secure Cloud Auditing with Efficient Ownership Transfer -- Privacy -- Encrypt-to-self: Securely Outsourcing Storage -- PGLP: Customizable and Rigorous Location Privacy through Policy Graph -- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party -- Password and Policy -- Distributed PCFG Password Cracking -- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage -- GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.
ISBN: 9783030589516$q(electronic bk.)
Standard No.: 10.1007/978-3-030-58951-6doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Computer security - ESORICS 202025th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.Part I /
LDR
:04294nmm a2200373 a 4500
001
585944
003
DE-He213
005
20200911143758.0
006
m d
007
cr nn 008maaau
008
210323s2020 sz s 0 eng d
020
$a
9783030589516$q(electronic bk.)
020
$a
9783030589509$q(paper)
024
7
$a
10.1007/978-3-030-58951-6
$2
doi
035
$a
978-3-030-58951-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
E89 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Computer security - ESORICS 2020
$h
[electronic resource] :
$b
25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020 : proceedings.
$n
Part I /
$c
edited by Liqun Chen ... [et al.].
246
3
$a
ESORICS 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xxviii, 760 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12308
490
1
$a
Security and cryptology
505
0
$a
Database and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma - A Framework for Learning Attribute-based Access Control Policies -- A Framework for Evaluating Client Privacy Leakages in Federated Learning -- Network Security -- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation -- PGC: Decentralized Con dential Payment System with Auditability -- Secure Cloud Auditing with Efficient Ownership Transfer -- Privacy -- Encrypt-to-self: Securely Outsourcing Storage -- PGLP: Customizable and Rigorous Location Privacy through Policy Graph -- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party -- Password and Policy -- Distributed PCFG Password Cracking -- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage -- GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
520
$a
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
0
$a
Computer networks.
$3
181923
650
0
$a
Application software.
$3
200645
650
0
$a
Software engineering.
$3
184729
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
650
2 4
$a
Special Purpose and Application-Based Systems.
$3
274487
650
2 4
$a
Software Engineering.
$3
274511
700
1
$a
Chen, Liqun.
$3
277026
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-58951-6
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000189764
電子館藏
1圖書
電子書
EB QA76.9.A25 E89 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-58951-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入