中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2022
会议名27th European Symposium on Research in Computer Security (ESORICS 2022)
中译名《第二十七届欧洲计算机安全研究专题研讨会,卷2》
机构Technical University of Denmark
会议日期September 26-30, 2022
会议地点Copenhagen, Denmark
出版年2022
馆藏号345149


题名作者出版年
A Machine Learning Approach to Detect Differential Treatment of Anonymous UsersIsabel Wagner2022
Utility-Preserving Biometric Information AnonymizationBill Moriarty; Chun-Fu (Richard) Chen; Shaohan Hu; Sean Moran; Marco Pistoia; Vincenzo Piuri; Pierangela Samarati2022
Anonymous Traceback for End-to-End EncryptionErin Kenney; Qiang Tang; Chase Wu2022
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage CostWilly Susilo; Yannan Li; Fuchun Guo; Jianchang Lai; Ge Wu2022
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers PayYubo Zheng; Peng Xu; Wei Wang; Tianyang Chen; Willy Susilo; Kaitai Liang; Hai Jin2022
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic EncryptionXingkai Wang; Zhenfu Cao; Zhen Liu; Kaitai Liang2022
Verifying the Quality of Outsourced Training on CloudsPeiyang Li; Ye Wang; Zhuotao Liu; Ke Xu; Qian Wang; Chao Shen; Qi Li2022
SecQuant: Quantifying Container System Call ExposureSunwoo Jang; Somin Song; Byungchul Tak; Sahil Suneja; Michael V. Le; Chuan Yue; Dan Williams2022
Robust and Scalable Process Isolation Against Spectre in the CloudMartin Schwarzl; Pietro Borrello; Andreas Kogler; Kenton Varda; Thomas Schuster; Michael Schwarz; Daniel Gruss2022
Administration of Machine Learning Based Access ControlMohammad Nur Nobi; Ram Krishnan; Yufei Huang; Ravi Sandhu2022
Real-Time Policy Enforcement with Metric First-Order Temporal LogicFrancois Hublet; David Basin; Srdan Krstic2022
A Tale of Four Gates Privilege Escalation and Permission Bypasses on Android Through App ComponentsAbdulla Aldoseri; David Oswald; Robert Chiper2022
Sequential Digital Signatures for Cryptographic Software-Update AuthenticationBertram Poettering; Simon Rastikian2022
On Committing Authenticated-EncryptionJohn Chan; Phillip Rogaway2022
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private KeyJingwei Jiang; Ding Wang; Guoyin Zhang; Zhiyuan Chen2022
The Revenge of Password Crackers: Automated Training of Password Cracking ToolsAlessia Michela Di Campi; Riccardo Focardi; Flaminia L. Luccio2022
Fuzzy Authenticated Key Exchange with Tight SecurityMingming Jiang; Shengli Liu; Shuai Han; Dawu Gu2022
Continuous Authentication in Secure MessagingBenjamin Dowling; Felix Gunther; Alexandre Poirrier2022
Half-Aggregation of Schnorr Signatures with Tight ReductionsYanbo Chen; Yunlei Zhao2022
Ring Signatures with User-Controlled LinkabilityDario Fiore; Lydia Garms; Dimitris Kolonelos; Claudio Soriente; Ida Tucker2022
12