- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22-24, 2025.
The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows:
AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses.
Contents
.- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns.
.- Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy.
.- Functional Credentials: a Practical Construction for the European Digital Identity.
.- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure.
.- Breaking verifiability and vote privacy in CHVote.
.- Zero-Click SnailLoad: From Minimal to No User Interaction.
.- Analysis of input-output mappings in coinjoin transactions with arbitrary values.
.- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.
.- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication.
.- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection.
.- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains.
.- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning.
.- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard.
.- RIPOST: Two-Phase Private Decomposition for Multidimensional Data.
.- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation.
.- Efficient and Secure Sleepy Model for BFT Consensus.
.- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference.
.- An Efficient Security-enhanced Accountable Access Control for Named Data Networking.
.- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies.
.- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization.
.- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance.
.- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.