Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV048495989
    Format: 1 Online-Ressource (xxiii, 789 Seiten) , 248 Illustrationen, 173 in Farbe
    ISBN: 9783031171437
    Series Statement: Lecture notes in computer science 13556
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17142-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17144-4
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_BV048495989
    Format: 1 Online-Ressource (xxiii, 789 Seiten) : , 248 Illustrationen, 173 in Farbe.
    ISBN: 978-3-031-17143-7
    Series Statement: Lecture notes in computer science 13556
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17142-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17144-4
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1817571478
    Format: 1 Online-Ressource(XXIII, 789 p. 248 illus., 173 illus. in color.)
    Edition: 1st ed. 2022.
    ISBN: 9783031171437
    Series Statement: Lecture Notes in Computer Science 13556
    Content: Formal Analysis -- A Formal Analysis of the FIDO2 Protocols -- Composable Security Treatment of ECVRF and Batch Verifications -- Effcient Proofs of Knowledge for Threshold Relations -- A tale of two models: formal verification of KEMTLS via Tamarin -- Web Security -- Browser-based CPU Fingerprinting -- Polymorphic Protocols at the Example of Mitigating Web Bots -- Unlinkable Delegation of WebAuthn Credentials -- Large Scale Analysis of DoH Deployment on the Internet -- Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations -- Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names -- Hardware Security -- CPU Port Contention Without SMT -- Protocols for a Two-Tiered Trusted Computing Base -- Using Memristor Arrays as Physical Unclonable Functions -- Multiparty Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique Multi-Party Computations Composed of Two-Party Computations -- PEA: Practical Private Epistasis Analysis using MPC -- ML Techniques -- Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems -- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices -- Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses -- FLMJR: Improving Robustness of Federated Learning via Model Stability -- MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding -- Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning -- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) -- Cyber-Physical Systems Security -- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems -- A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator -- From Click To Sink: utilizing AIS for command and control in maritime cyber attacks -- Effcient Hash-Based Redactable Signature for Smart Grid Applications -- Can Industrial Intrusion Detection Be SIMPLE -- For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection -- Towards Effcient Auditing for Real-Time Systems -- Network and Software Security -- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks -- PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks -- Detecting Cross-Language Memory Management Issues in Rust -- Reach Me if You Can: On Native Vulnerability Reachability in Android Apps -- Extensible Virtual Call Integrity -- Posters -- Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords -- A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation -- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet -- MixCT: Mixing Confidential Transactions from Homomorphic Commitment -- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python -- The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models. .
    Content: The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
    Additional Edition: ISBN 9783031171420
    Additional Edition: ISBN 9783031171444
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783031171420
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783031171444
    Language: English
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949371962602882
    Format: XXIII, 789 p. 248 illus., 173 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9783031171437
    Series Statement: Lecture Notes in Computer Science, 13556
    Content: The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
    Note: Formal Analysis -- A Formal Analysis of the FIDO2 Protocols -- Composable Security Treatment of ECVRF and Batch Verifications -- Effcient Proofs of Knowledge for Threshold Relations -- A tale of two models: formal verification of KEMTLS via Tamarin -- Web Security -- Browser-based CPU Fingerprinting -- Polymorphic Protocols at the Example of Mitigating Web Bots -- Unlinkable Delegation of WebAuthn Credentials -- Large Scale Analysis of DoH Deployment on the Internet -- Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations -- Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names -- Hardware Security -- CPU Port Contention Without SMT -- Protocols for a Two-Tiered Trusted Computing Base -- Using Memristor Arrays as Physical Unclonable Functions -- Multiparty Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique Multi-Party Computations Composed of Two-Party Computations -- PEA: Practical Private Epistasis Analysis using MPC -- ML Techniques -- Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems -- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices -- Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses -- FLMJR: Improving Robustness of Federated Learning via Model Stability -- MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding -- Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning -- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) -- Cyber-Physical Systems Security -- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems -- A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator -- From Click To Sink: utilizing AIS for command and control in maritime cyber attacks -- Effcient Hash-Based Redactable Signature for Smart Grid Applications -- Can Industrial Intrusion Detection Be SIMPLE -- For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection -- Towards Effcient Auditing for Real-Time Systems -- Network and Software Security -- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks -- PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks -- Detecting Cross-Language Memory Management Issues in Rust -- Reach Me if You Can: On Native Vulnerability Reachability in Android Apps -- Extensible Virtual Call Integrity -- Posters -- Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords -- A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation -- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet -- MixCT: Mixing Confidential Transactions from Homomorphic Commitment -- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python -- The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models. .
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031171420
    Additional Edition: Printed edition: ISBN 9783031171444
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV048527809
    Format: xxiii, 789 Seiten , Illustrationen, Diagramme
    ISBN: 9783031171420
    Series Statement: Lecture notes in computer science 13556
    In: 3
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-031-17143-7
    Language: English
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edoccha_BV048495989
    Format: 1 Online-Ressource (xxiii, 789 Seiten) : , 248 Illustrationen, 173 in Farbe.
    ISBN: 978-3-031-17143-7
    Series Statement: Lecture notes in computer science 13556
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17142-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17144-4
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    edocfu_BV048495989
    Format: 1 Online-Ressource (xxiii, 789 Seiten) : , 248 Illustrationen, 173 in Farbe.
    ISBN: 978-3-031-17143-7
    Series Statement: Lecture notes in computer science 13556
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17142-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-17144-4
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783000171437?
Did you mean 9783030871437?
Did you mean 9783031001437?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages