Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: cod="ro"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/137915961X |
| Titel | Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Person(en) |
Nicomette, Vincent (Herausgeber) Benzekri, Abdelmalek (Herausgeber) Boulahia-Cuppens, Nora (Herausgeber) Vaidya, Jaideep (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2026 |
| Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2026 |
| Umfang/Format | Online-Ressource, XXI, 530 p. 121 illus., 56 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-032-07890-2 Printed edition:: ISBN: 978-3-032-07892-6 |
| Inhalt | -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2510170411594.746697562113 DOI: 10.1007/978-3-032-07891-9 |
| URL | https://doi.org/10.1007/978-3-032-07891-9 |
| ISBN/Einband/Preis | 978-3-032-07891-9 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Lecture Notes in Computer Science ; 16054 |
| DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

