中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Computer Security - ESORICS 2022
会议名
27th European Symposium on Research in Computer Security (ESORICS 2022)
中译名
《第二十七届欧洲计算机安全研究专题研讨会,卷3》
机构
Technical University of Denmark
会议日期
September 26-30, 2022
会议地点
Copenhagen, Denmark
出版年
2022
馆藏号
345150
题名
作者
出版年
A Formal Analysis of the FIDO2 Protocols
Jingjing Guan; Hui Li; Haisong Ye; Ziming Zhao
2022
A Composable Security Treatment of ECVRF and Batch Verifications
Christian Badertscher; Peter Gazi; Inigo Querejeta-Azurmendi; Alexander Russell
2022
Efficient Proofs of Knowledge for Threshold Relations
Gennaro Avitabile; Vincenzo Botta; Daniele Friolo; Ivan Visconti
2022
A Tale of Two Models: Formal Verification of KEMTLS via Tamarin
Sofia Celi; Jonathan Hoyland; Douglas Stebila; Thom Wiggers
2022
Browser-Based CPU Fingerprinting
Leon Trampert; Christian Rossow; Michael Schwarz
2022
Polymorphic Protocols at the Example of Mitigating Web Bots
August See; Leon Fritz; Mathias Fischer
2022
Unlinkable Delegation of WebAuthn Credentials
Nick Frymann; Daniel Gardham; Mark Manulis
2022
Large Scale Analysis of DoH Deployment on the Internet
Sebastian Garcia; Joaquin Bogado; Karel Hynek; Dmitrii Vekshin; Tomas Cejka; Armin Wasicek
2022
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations
Joshua Reynolds; Adam Bates; Michael Bailey
2022
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names
Mingxuan Liu; Yiming Zhang; Baojun Liu; Haixin Duan
2022
CPU Port Contention Without SMT
Thomas Rokicki; Clementine Maurice; Michael Schwarz
2022
Protocols for a Two-Tiered Trusted Computing Base
Jose Moreira; Mark D. Ryan; Flavio D. Garcia
2022
Using Memristor Arrays as Physical Unclonable Functions
Florian Frank; Tolga Arul; Nikolaos Athanasios Anagnostopoulos; Stefan Katzenbeisser
2022
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference
Wenxing Zhu; Mengqi Wei; Xiangxue Li; Qiang Li
2022
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
Erik-Oliver Blass; Florian Kerschbaum
2022
PEA: Practical Private Epistasis Analysis Using MPC
Kay Hamacher; Tobias Kussel; Thomas Schneider; Oleksandr Tkachenko
2022
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems
Zeyan Liu; Fengjun Li; Jingqiang Lin; Zhu Li; Bo Luo
2022
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices
Younghan Lee; Sohee Jun; Yungi Cho; Woorim Han; Hyungon Moon; Yunheung Paek
2022
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses
Buse G. A. Tekgul; Shelly Wang; Samuel Marchal; N. Asokan
2022
FLMJR: Improving Robustness of Federated Learning via Model Stability
Qi Guo; Di Wu; Yong Qi; Saiyu Qi; Qian Li
2022
1
2
3
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2024