Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part II (Lecture Notes in Computer Science)

個数:
  • 予約

Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part II (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 519 p.
  • 言語 ENG
  • 商品コード 9783032078902

Full Description

This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22-24, 2025.

The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: 

AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. 

Contents

.- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts.
.- Tetris! Traceable Extendable Threshold Ring Signatures and More.
.- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing.
.- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries.
.- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies.
.- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws.
.- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation.
.- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions.
.- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array.
.- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA.
.- A post-quantum Distributed OPRF from the Legendre PRF.
.- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications.
.- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme.
.- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices.
.- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller.
.- Formalisation of KZG commitment schemes in EasyCrypt.
.- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption.
.- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization.
.- Code Encryption with Intel TME-MK for Control-Flow Enforcement.
.- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption.
.- Polylogarithmic Polynomial Commitment Scheme over Galois Rings.
.- Efficient Homomorphic Evaluation for Non-Polynomial Functions.
.- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU.
.- Formally-verified Security against Forgery of Remote Attestation using SSProve.
.- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices.
.- Extending Groth16 for Disjunctive Statements.

最近チェックした商品