Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part IV (Lecture Notes in Computer Science)

個数:
  • 予約

Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part IV (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 457 p.
  • 言語 ENG
  • 商品コード 9783032079008

Full Description

This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22-24, 2025.

The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: 

AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. 

Contents

.- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns.
.- Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy.
.- Functional Credentials: a Practical Construction for the European Digital Identity.
.- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure.
.- Breaking verifiability and vote privacy in CHVote.
.- Zero-Click SnailLoad: From Minimal to No User Interaction.
.- Analysis of input-output mappings in coinjoin transactions with arbitrary values.
.- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.
.- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication.
.- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection.
.- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains.
.- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning.
.- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard.
.- RIPOST: Two-Phase Private Decomposition for Multidimensional Data.
.- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation.
.- Efficient and Secure Sleepy Model for BFT Consensus.
.- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference.
.- An Efficient Security-enhanced Accountable Access Control for Named Data Networking.
.- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies.
.- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization.
.- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance.
.- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.

最近チェックした商品