Computer Security – ESORICS 2022 (Record no. 186610)

MARC details
000 -LEADER
fixed length control field 06722nam a22006495i 4500
001 - CONTROL NUMBER
control field 978-3-031-17143-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423130240.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220923s2022 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031171437
-- 978-3-031-17143-7
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-17143-7
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Computer Security – ESORICS 2022
Medium [electronic resource] :
Remainder of title 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III /
Statement of responsibility, etc edited by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2022.
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2022.
300 ## - PHYSICAL DESCRIPTION
Extent XXIII, 789 p. 248 illus., 173 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume number/sequential designation 13556
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Formal Analysis -- A Formal Analysis of the FIDO2 Protocols -- Composable Security Treatment of ECVRF and Batch Verifications -- Effcient Proofs of Knowledge for Threshold Relations -- A tale of two models: formal verification of KEMTLS via Tamarin -- Web Security -- Browser-based CPU Fingerprinting -- Polymorphic Protocols at the Example of Mitigating Web Bots -- Unlinkable Delegation of WebAuthn Credentials -- Large Scale Analysis of DoH Deployment on the Internet -- Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations -- Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names -- Hardware Security -- CPU Port Contention Without SMT -- Protocols for a Two-Tiered Trusted Computing Base -- Using Memristor Arrays as Physical Unclonable Functions -- Multiparty Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique Multi-Party Computations Composed of Two-Party Computations -- PEA: Practical Private Epistasis Analysis using MPC -- ML Techniques -- Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems -- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices -- Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses -- FLMJR: Improving Robustness of Federated Learning via Model Stability -- MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding -- Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning -- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) -- Cyber-Physical Systems Security -- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems -- A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator -- From Click To Sink: utilizing AIS for command and control in maritime cyber attacks -- Effcient Hash-Based Redactable Signature for Smart Grid Applications -- Can Industrial Intrusion Detection Be SIMPLE -- For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection -- Towards Effcient Auditing for Real-Time Systems -- Network and Software Security -- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks -- PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks -- Detecting Cross-Language Memory Management Issues in Rust -- Reach Me if You Can: On Native Vulnerability Reachability in Android Apps -- Extensible Virtual Call Integrity -- Posters -- Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords -- A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation -- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet -- MixCT: Mixing Confidential Transactions from Homomorphic Commitment -- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python -- The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models. .
520 ## - SUMMARY, ETC.
Summary, etc The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers, Special purpose.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Special Purpose and Application-Based Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer System Implementation.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Atluri, Vijayalakshmi.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Di Pietro, Roberto.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Jensen, Christian D.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Meng, Weizhi.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031171420
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031171444
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 1611-3349 ;
Volume number/sequential designation 13556
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-17143-7">https://doi.org/10.1007/978-3-031-17143-7</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in