Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: cod="ra"



Treffer 51 von 2978943 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1378795024
Titel Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Person(en) Nicomette, Vincent (Herausgeber)
Benzekri, Abdelmalek (Herausgeber)
Boulahia-Cuppens, Nora (Herausgeber)
Vaidya, Jaideep (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XXI, 454 p. 147 illus., 116 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-032-07900-8
Printed edition:: ISBN: 978-3-032-07902-2
Inhalt -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains
Persistent Identifier URN: urn:nbn:de:101:1-2510130414301.832856004288
DOI: 10.1007/978-3-032-07901-5
URL https://doi.org/10.1007/978-3-032-07901-5
ISBN/Einband/Preis 978-3-032-07901-5
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 16056
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 51 von 2978943
< < > <


E-Mail-IconAdministration