Computer Security - ESORICS 2020 (Record no. 89340)

000 -LEADER
fixed length control field 05814nam a22006735i 4500
001 - CONTROL NUMBER
control field 978-3-030-58951-6
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730174249.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200911s2020 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030589516
-- 978-3-030-58951-6
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-58951-6
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Computer Security - ESORICS 2020
Medium [electronic resource] :
Remainder of title 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I /
Statement of responsibility, etc. edited by Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2020.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer International Publishing :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent XXVIII, 760 p. 637 illus., 141 illus. in color.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 12308
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Database and Web Security -- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment -- Bulwark: Holistic and Verified Security Monitoring of Web Protocols -- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing -- Software Security -- Follow the blue bird: A study on threat data published on Twitter -- Dynamic and Secure Memory Transformation in Userspace -- Understanding the Security Risks of Docker Hub -- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon -- Software Security -- Similarity of Binaries across Optimization Levels and Obfuscations -- HART: Hardware-assisted Kernel Module Tracing on Arm -- Zipper Stack: Shadow Stacks Without Shadow -- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening -- LegIoT: Ledgered Trust Management Platform for IoT -- Machine Learning Security -- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning -- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference -- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES -- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems -- Machine Learning Security -- Data Poisoning Attacks Against Federated Learning Systems -- Interpretable Probabilistic Password Strength Meters via Deep Learning -- Polisma - A Framework for Learning Attribute-based Access Control Policies -- A Framework for Evaluating Client Privacy Leakages in Federated Learning -- Network Security -- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation -- PGC: Decentralized Con dential Payment System with Auditability -- Secure Cloud Auditing with Efficient Ownership Transfer -- Privacy -- Encrypt-to-self: Securely Outsourcing Storage -- PGLP: Customizable and Rigorous Location Privacy through Policy Graph -- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party -- Password and Policy -- Distributed PCFG Password Cracking -- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies Through Audio Leakage -- GDPR - Challenges for Reconciling Legal Rules with Technical Reality.
520 ## - SUMMARY, ETC.
Summary, etc. The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain. .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 3969
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application software.
9 (RLIN) 111748
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers, Special purpose.
9 (RLIN) 46653
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Software engineering.
9 (RLIN) 4138
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile and Network Security.
9 (RLIN) 33624
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Communication Networks.
9 (RLIN) 111749
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer and Information Systems Applications.
9 (RLIN) 111750
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Special Purpose and Application-Based Systems.
9 (RLIN) 46654
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Software Engineering.
9 (RLIN) 4138
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chen, Liqun.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 111751
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Li, Ninghui.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 111752
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liang, Kaitai.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 111753
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schneider, Steve.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 111754
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 111755
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030589509
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030589523
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 12308
9 (RLIN) 111756
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-030-58951-6">https://doi.org/10.1007/978-3-030-58951-6</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.