001449870 000__ 05821cam\a2200601\i\4500 001449870 001__ 1449870 001449870 003__ OCoLC 001449870 005__ 20230310004422.0 001449870 006__ m\\\\\o\\d\\\\\\\\ 001449870 007__ cr\cn\nnnunnun 001449870 008__ 220928s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001449870 020__ $$a9783031171468$$q(electronic bk.) 001449870 020__ $$a3031171462$$q(electronic bk.) 001449870 020__ $$z9783031171451 001449870 0247_ $$a10.1007/978-3-031-17146-8$$2doi 001449870 035__ $$aSP(OCoLC)1346149967 001449870 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCF$$dOCLCQ$$dUKAHL 001449870 049__ $$aISEA 001449870 050_4 $$aQA76.9.A25 001449870 08204 $$a005.8/2$$223/eng/20220928 001449870 1112_ $$aEuropean Symposium on Research in Computer Security$$n(27th :$$d2022 :$$cCopenhagen, Denmark : Online) 001449870 24510 $$aComputer security - ESORICS 2022 :$$b27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, proceedings.$$nPart II /$$cVijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng (eds.). 001449870 264_1 $$aCham :$$bSpringer,$$c[2022] 001449870 264_4 $$c©2022 001449870 300__ $$a1 online resource (xxii, 741 pages) :$$billustrations (some color). 001449870 336__ $$atext$$btxt$$2rdacontent 001449870 337__ $$acomputer$$bc$$2rdamedia 001449870 338__ $$aonline resource$$bcr$$2rdacarrier 001449870 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v13555 001449870 500__ $$aInternational conference proceedings. 001449870 500__ $$aIncludes author index. 001449870 5050_ $$aAnonymity -- A Machine Learning Approach to Detect Differential Treatment of Anonymous Users -- Utility-Preserving Biometric Information Anonymization -- Anonymous Traceback for End-to-End Encryption -- Cloud Security -- Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost -- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay -- Lighter Is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption -- Verifying the Quality of Outsourced Training on Clouds -- SecQuant: Quantifying Container System Call Exposure -- Dynamic Process Isolation -- Access Control -- Administration of Machine Learning Based Access Control -- Real-time Policy Enforcement with Metric First-Order Temporal Logic -- A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android through App Components -- Authentication -- Sequential Digital Signatures for Cryptographic Software-Update Authentication -- On Committing Authenticated Encryption -- Quantum-Resistant Password Based Threshold Single-Sign-On Authentication with Updatable Server Private Key -- The Revenge of Password Crackers: Automated Training of Password Cracking Tools -- Fuzzy Authenticated Key Exchange with Tight Security -- Continuous Authentication in Secure Messaging -- Digital Signatures -- Half-Aggregation of Schnorr Signatures with Tight Reductions -- Ring Signatures with User-Controlled Linkability -- DualDory: Logarithmic-verifier linkable ring signatures through preprocessing -- Effcient Unique Ring Signatures From Lattices -- Kiyomoto Verifiable Timed Linkable Ring Signatures For Scalable Payments for Monero -- Deterministic Wallets for Adaptor Signatures -- Puncturable Signature: A Generic Construction and Instantiations -- IoT Security -- fASLR: Function-Based ASLR for Resource-Constrained IoT Systems -- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks -- IoTEnsemble: Detection of Botnet Attacks on Internet of Things -- IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps -- No-Label User-Level Membership Inference for ASR Model Auditing -- Applications -- A toolbox for verifiable tally-hiding e-voting systems -- How to Verifiably Encrypt Many Bits for an Election -- A framework for constructing Single Secret Leader Election from MPC -- AppBastion: Protection from Untrusted Apps and OSes on ARM -- Collaborative anomaly detection system for charging stations. 001449870 506__ $$aAccess limited to authorized users. 001449870 520__ $$aThe three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters. 001449870 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 28, 2022). 001449870 650_0 $$aComputer security$$vCongresses. 001449870 650_0 $$aData encryption (Computer science)$$vCongresses. 001449870 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001449870 650_0 $$aData protection$$vCongresses. 001449870 655_0 $$aElectronic books. 001449870 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001449870 655_7 $$aConference papers and proceedings.$$2lcgft 001449870 7001_ $$aAtluri, Vijay,$$d1956-$$eeditor. 001449870 7001_ $$aDi Pietro, Roberto$$c(Computer scientist),$$eeditor. 001449870 7001_ $$aJensen, Christian D.,$$eeditor. 001449870 7001_ $$aMeng, Weizhi,$$d1986-$$eeditor. 001449870 830_0 $$aLecture notes in computer science ;$$v13555.$$x1611-3349 001449870 852__ $$bebk 001449870 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-17146-8$$zOnline Access$$91397441.1 001449870 909CO $$ooai:library.usi.edu:1449870$$pGLOBAL_SET 001449870 980__ $$aBIB 001449870 980__ $$aEBOOK 001449870 982__ $$aEbook 001449870 983__ $$aOnline 001449870 994__ $$a92$$bISE