中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2022
会议名27th European Symposium on Research in Computer Security (ESORICS 2022)
中译名《第二十七届欧洲计算机安全研究专题研讨会,卷1》
机构Technical University of Denmark
会议日期September 26-30, 2022
会议地点Copenhagen, Denmark
出版年2022
馆藏号345148


题名作者出版年
A Blockchain-Based Long-Term Time-Stamping SchemeLong Meng; Liqun Chen2022
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS BlockchainMaxime Buser; Rafael Dowsley; Muhammed F. Esgin; Shabnam Kasra Kermanshahi; Veronika Kuchta; Joseph K. Liu; Raphael C. -W. Phan; Zhenfei Zhang2022
Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the ForkNicholas Stifter; Aljosha Judmayer; Philipp Schindler; Edgar Weippl2022
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?Jayamine Alupotha; Xavier Boyen; Matthew McKague2022
Secure Hierarchical Deterministic Wallet Supporting Stealth AddressXin Yin; Zhen Liu; Guomin Yang; Guoxing Chen; Haojin Zhu2022
Zero-Knowledge Age Restriction for GNU TalerOzgur Kesim; Christian Grothoff; Florian Dold; Martin Schanzenbach2022
Privacy Leakage in Privacy-Preserving Neural Network InferenceMengqi Wei; Wenxing Zhu; Liangkun Cui; Xiangxue Li; Qiang Li2022
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy PreferencesRicardo Mendes; Mariana Cunha; Joao P. Vilela; Alastair R. Beresford2022
One Vote Is Enough for Analysing PrivacyStephanie Delaune; Joseph Lallemand2022
Local Differential Privacy for Federated LearningPathum Chamikara Mahawaga Arachchige; Dongxi Liu; Seyit Camtepe; Surya Nepal; Marthie Grobler; Peter Bertok; Ibrahim Khalil2022
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWEChengyu Lin; Zeyu Liu; Tal Malkin2022
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive PandemicLiron David; Avinatan Hassidim; Yossi Matias; Moti Yung2022
Generic Construction of Trace-and-Revoke Inner Product Functional EncryptionFucai Luo; Saif Al-Kuwari; Haiyan Wang; Weihong Han2022
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and MoreHuy Quoc Le; Dung Hoang Duong; Willy Susilo; Josef Pieprzyk2022
Public Key Authenticated Encryption with Keyword Search from LWELeixiao Cheng; Fei Meng2022
An Efficient Query Recovery Attack Against a Graph Encryption SchemeFrancesca Falzon; Kenneth G. Paterson2022
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal OverheadJiaojiao Wu; Jianfeng Wang; Xinwei Yong; Xinyi Huang; Xiaofeng Chen2022
A Formal Model for Credential Hopping AttacksMassimiliano Albanese; Karin L. Johnsgard; Vipin Swarup2022
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are EquivalentHuanhuan Chen; Shihui Fu; Kaitai Liang2022
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic CiphertextsJelle Vos; Daniel Vos; Zekeriya Erkin2022
12