中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Computer Security - ESORICS 2022
会议名
27th European Symposium on Research in Computer Security (ESORICS 2022)
中译名
《第二十七届欧洲计算机安全研究专题研讨会,卷2》
机构
Technical University of Denmark
会议日期
September 26-30, 2022
会议地点
Copenhagen, Denmark
出版年
2022
馆藏号
345149
题名
作者
出版年
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
Isabel Wagner
2022
Utility-Preserving Biometric Information Anonymization
Bill Moriarty; Chun-Fu (Richard) Chen; Shaohan Hu; Sean Moran; Marco Pistoia; Vincenzo Piuri; Pierangela Samarati
2022
Anonymous Traceback for End-to-End Encryption
Erin Kenney; Qiang Tang; Chase Wu
2022
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
Willy Susilo; Yannan Li; Fuchun Guo; Jianchang Lai; Ge Wu
2022
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay
Yubo Zheng; Peng Xu; Wei Wang; Tianyang Chen; Willy Susilo; Kaitai Liang; Hai Jin
2022
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
Xingkai Wang; Zhenfu Cao; Zhen Liu; Kaitai Liang
2022
Verifying the Quality of Outsourced Training on Clouds
Peiyang Li; Ye Wang; Zhuotao Liu; Ke Xu; Qian Wang; Chao Shen; Qi Li
2022
SecQuant: Quantifying Container System Call Exposure
Sunwoo Jang; Somin Song; Byungchul Tak; Sahil Suneja; Michael V. Le; Chuan Yue; Dan Williams
2022
Robust and Scalable Process Isolation Against Spectre in the Cloud
Martin Schwarzl; Pietro Borrello; Andreas Kogler; Kenton Varda; Thomas Schuster; Michael Schwarz; Daniel Gruss
2022
Administration of Machine Learning Based Access Control
Mohammad Nur Nobi; Ram Krishnan; Yufei Huang; Ravi Sandhu
2022
Real-Time Policy Enforcement with Metric First-Order Temporal Logic
Francois Hublet; David Basin; Srdan Krstic
2022
A Tale of Four Gates Privilege Escalation and Permission Bypasses on Android Through App Components
Abdulla Aldoseri; David Oswald; Robert Chiper
2022
Sequential Digital Signatures for Cryptographic Software-Update Authentication
Bertram Poettering; Simon Rastikian
2022
On Committing Authenticated-Encryption
John Chan; Phillip Rogaway
2022
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
Jingwei Jiang; Ding Wang; Guoyin Zhang; Zhiyuan Chen
2022
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
Alessia Michela Di Campi; Riccardo Focardi; Flaminia L. Luccio
2022
Fuzzy Authenticated Key Exchange with Tight Security
Mingming Jiang; Shengli Liu; Shuai Han; Dawu Gu
2022
Continuous Authentication in Secure Messaging
Benjamin Dowling; Felix Gunther; Alexandre Poirrier
2022
Half-Aggregation of Schnorr Signatures with Tight Reductions
Yanbo Chen; Yunlei Zhao
2022
Ring Signatures with User-Controlled Linkability
Dario Fiore; Lydia Garms; Dimitris Kolonelos; Claudio Soriente; Ida Tucker
2022
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2024