Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
Neuigkeiten Dienstag 18. November 2025: Die Lesesäle der Deutschen Nationalbibliothek in Frankfurt am Main öffnen wegen einer Personalversammlung erst ab 13 Uhr. // Tuesday 18 November 2025: The reading rooms of the German National Library in Frankfurt am Main will open at 13:00 due to a staff assembly.
 
 

Ergebnis der Suche nach: cod="ro"



Treffer 103 von 4505610 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/137915961X
Titel Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Person(en) Nicomette, Vincent (Herausgeber)
Benzekri, Abdelmalek (Herausgeber)
Boulahia-Cuppens, Nora (Herausgeber)
Vaidya, Jaideep (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XXI, 530 p. 121 illus., 56 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-032-07890-2
Printed edition:: ISBN: 978-3-032-07892-6
Inhalt -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements
Persistent Identifier URN: urn:nbn:de:101:1-2510170411594.746697562113
DOI: 10.1007/978-3-032-07891-9
URL https://doi.org/10.1007/978-3-032-07891-9
ISBN/Einband/Preis 978-3-032-07891-9
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 16054
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 103 von 4505610
< < > <


E-Mail-IconAdministration