000 05626nam a22006735i 4500
001 978-3-030-29962-0
003 DE-He213
005 20240730171029.0
007 cr nn 008mamaa
008 190826s2019 sz | s |||| 0|eng d
020 _a9783030299620
_9978-3-030-29962-0
024 7 _a10.1007/978-3-030-29962-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aComputer Security - ESORICS 2019
_h[electronic resource] :
_b24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II /
_cedited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXXVI, 627 p. 803 illus., 71 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11736
505 0 _aSoftware Security -- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs -- Uncovering Information Flow Policy Violations in C Programs -- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning -- Static Detection of Uninitialized Stack Variables in Binary Code -- Towards Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices -- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails -- Feistel Structures for MPC, and More -- Arithmetic Garbling from Bilinear Maps -- Security Models -- SEPD: An Access Control Model for Resource Sharing in an IoT Environment -- Nighthawk: Transparent System Introspection from Ring -3 -- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement -- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics -- Searchable Encryption -- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy -- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption -- Generic Multi-keyword Ranked Search on Encrypted Cloud Data -- An Efficiently Searchable Encrypted Data Structure for Range Queries -- Privacy -- GDPiRated - Stealing Personal Information On- and Offline -- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation -- OCRAM-assisted Sensitive Data Protection on ARM-based Platform -- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping -- Key Exchange Protocols -- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography -- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation -- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope -- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids -- Web Security -- The Risks of WebGL: Analysis, Evaluation and Detection -- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks -- Fingerprint Surface-Based Detection of Web Bot Detectors -- Testing for Integrity Flaws in Web Sessions.
520 _aThe two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows: Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts. Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
650 0 _aData protection.
_97245
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aComputers.
_98172
650 0 _aArtificial intelligence.
_93407
650 0 _aApplication software.
_996810
650 0 _aSoftware engineering.
_94138
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Engineering and Networks.
_996812
650 2 4 _aComputing Milieux.
_955441
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aComputer and Information Systems Applications.
_996815
650 2 4 _aSoftware Engineering.
_94138
700 1 _aSako, Kazue.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996817
700 1 _aSchneider, Steve.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996818
700 1 _aRyan, Peter Y. A.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996821
710 2 _aSpringerLink (Online service)
_996822
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030299613
776 0 8 _iPrinted edition:
_z9783030299637
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11736
_996823
856 4 0 _uhttps://doi.org/10.1007/978-3-030-29962-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c87364
_d87364