中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2025
会议名30th European Symposium on Research in Computer Security (ESORICS 2025)
中译名《第三十届欧洲计算机安全研究专题研讨会,卷4》
会议日期September 22-24, 2025
会议地点Toulouse, France
出版年2026
馆藏号359414


题名作者出版年
Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark PatternsMehrdad Bahrini; Alexander Herbst; Merle Freye; Matthias Kohn; Karsten Sohr; Rainer Malaka2026
Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential PrivacyBerkay Kemal Balioglu; Alireza Khodaie; M. Emre Gursoy2026
Functional Credentials: A Practical Construction for the European Digital IdentityGiovanni Bartolomeo2026
Privacy-Preserving k-Nearest Neighbor Query: Faster and More SecureJialin Chi; Cheng Hong; Axin Wu; Tianqi Sun; ZheChen Li; Min Zhang; Dengguo Feng2026
Breaking Verifiability and Vote Privacy in CHVoteVeronique Cortier; Alexandre Debant; Pierrick Gaudry2026
Zero-Click SnailLoad: From Minimal to No User InteractionStefan Gast; Nora Puntigam; Simone Franza; Sudheendra Raghav Neela; Daniel Gruss; Johanna Ullrich2026
Analysis of Input-Output Mappings in Coinjoin Transactions with Arbitrary ValuesJiri Gavenda; Petr Svenda; Stanislav Bobon; Vladimir Sedlacek2026
Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML SettingsBingyang Guo; Mingxuan Liu; Yihui Ma; Ruixuan Li; Fan Shi; Min Zhang; Baojun Liu; Chengxi Xu; Haixin Duan; Geng Hong; Min Yang; Qingfeng Pan2026
BlowPrint: Blow-Based Multi-factor Biometrics for Smartphone User AuthenticationHoward Halim; Eyasu Getahun Chekole; Daniel Reijsbergen; Jianying Zhou2026
GET-AID: Graph-Enhanced Transformer for Provenance-Based Advanced Persistent Threats Investigation and DetectionZhicheng Huang; Fengyuan Xu; Jiahong Yang; Wenting Li; Zonghua Zhang; Chenbin Zhang; Meng Ma; Ping Wang2026
The Economics of Deception: Structural Patterns of Rug Pull Across DeFi BlockchainsBhavani Kalal; Abdulrahman Alhaidari; Balaji Palanisamy; Shamik Sural2026
Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation LearningYoucef Korichi; Josee Desharnais; Sebastian Gambs; Nadia Tawbi2026
Fine-Grained, Privacy-Augmenting LI-Compliance in the LAKE StandardPascal Lafourcade; Elsa Lopez Perez; Charles Olivier-Anclin; Cristina Onete; Clement Papon; Malisa Vucinic2026
RIPOST: Two-Phase Private Decomposition for Multidimensional DataAla Eddine Laouir; Abdessamad Imine2026
Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound EvaluationTakumi Namiki; Takumi Amada; Mitsugu Iwamoto; Yohei Watanabe2026
Efficient and Secure Sleepy Model for BFT ConsensusPengkun Ren; Hai Dong; Zahir Tari; Pengcheng Zhang2026
An Algebraic Approach to Asymmetric Delegation and Polymorphic Label InferenceSilei Ren; Cosku Acay; Andrew C. Myers2026
An Efficient Security-Enhanced Accountable Access Control for Named Data NetworkingJianfei Sun; Yuxian Li; Xuehuan Yang; Guomin Yang; Robert Deng2026
Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible PoliciesYansen Xin; Rui Zhang; Zhenglin Fan; Ze Jia2026
A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and UtilizationOsama Zafar; Mina Namazi; Yuqiao Xu; Youngjin Yoo; Erman Ayday2026
12