Computer security -- ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings.: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings. Part I (2020)
- Record Type:
- Book
- Title:
- Computer security -- ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings.: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings. Part I (2020)
- Main Title:
- Computer security -- ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings.
- Other Titles:
- ESORICS 2020
- Further Information:
- Note: Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider (eds.).
- Other Names:
- Chen, Liqun
(Computer scientist), Li, Ninghui
Liang, Kaitai
Schneider, S. A (Steve A.)
European Symposium on Research in Computer Security, 25th - Contents:
- Database and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces -- A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma -- ADatabase and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces -- A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma -- A Framework for Learning Attribute-based Access Control Policies -- A Framework for Evaluating Client Privacy Leakages in Federated Learning -- Network Security -- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation -- PGC: Decentralized Con dential Payment System with Auditability -- Secure Cloud Auditing with Efficient Ownership Transfer -- Privacy -- Encrypt-to-self: Securely Outsourcing Storage -- PGLP: Customizable and Rigorous Location Privacy through Policy Graph -- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party -- Password and Policy -- Distributed PCFG Password Cracking -- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage -- GDPR -- Challenges for Reconciling Legal Rules with Technical Reality. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource, illustrations (some colour)
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks
Application software
Software engineering
Electronic books - Languages:
- English
- ISBNs:
- 9783030589516
- Related ISBNs:
- 303058951X
9783030589509 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.551857
- Ingest File:
- 03_171.xml