001449871 000__ 05932cam\a2200601\i\4500 001449871 001__ 1449871 001449871 003__ OCoLC 001449871 005__ 20230310004422.0 001449871 006__ m\\\\\o\\d\\\\\\\\ 001449871 007__ cr\cn\nnnunnun 001449871 008__ 220928s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001449871 020__ $$a9783031171406$$q(electronic bk.) 001449871 020__ $$a3031171403$$q(electronic bk.) 001449871 020__ $$z9783031171390 001449871 0247_ $$a10.1007/978-3-031-17140-6$$2doi 001449871 035__ $$aSP(OCoLC)1346150065 001449871 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCF$$dOCLCQ 001449871 049__ $$aISEA 001449871 050_4 $$aQA76.9.A25 001449871 08204 $$a005.8/2$$223/eng/20220928 001449871 1112_ $$aEuropean Symposium on Research in Computer Security$$n(27th :$$d2022 :$$cCopenhagen, Denmark : Online) 001449871 24510 $$aComputer security - ESORICS 2022 :$$b27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, proceedings.$$nPart I /$$cVijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng (eds.). 001449871 264_1 $$aCham :$$bSpringer,$$c[2022] 001449871 264_4 $$c©2022 001449871 300__ $$a1 online resource (xxxvii, 723 pages) :$$billustrations (chiefly color). 001449871 336__ $$atext$$btxt$$2rdacontent 001449871 337__ $$acomputer$$bc$$2rdamedia 001449871 338__ $$aonline resource$$bcr$$2rdacarrier 001449871 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v13554 001449871 500__ $$aInternational conference proceedings. 001449871 500__ $$aIncludes author index. 001449871 5050_ $$aBlockchain Security -- A Blockchain-based Long-Term Time-Stamping Scheme -- Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain -- Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and love the Fork -- Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers -- Secure Hierarchical Deterministic Wallet Supporting Stealth Address -- Zero-Knowledge Age Restriction for GNU Taler -- Privacy -- Privacy Leakage in Privacy-Preserving Neural Network Inference -- Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences -- One vote is enough for analysing privacy -- Local Differential Privacy for Federated Learning -- XSPIR: Effcient Symmetrically Private Information Retrieval from Ring-LWE -- Scaling Up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic -- Crypto -- Generic Construction of Trace-and-Revoke Inner Product Functional Encryption -- Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More -- Public Key Authenticated Encryption with Keyword Search from LWE -- An Effcient Query Recovery Attack Against a Graph Encryption Scheme -- New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead -- A Formal Model for Credential Hopping Attacks -- No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent -- Effcient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts -- Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability -- Attacks -- Kallima: A Clean-label Framework for Textual Backdoor Attacks -- Two Types of Novel DoS Attacks against CDNs Based on HTTP/2 Flow Control Mechanism -- EVExchange: A Relay Attack on Electric Vehicle Charging System -- Turrin Smart RPKI Validation: Avoiding Errors and Preventing Hijacks -- Cyber Network Resilience against Self-Propagating Malware Attacks -- INC: In-Network Classification of Botnet Propagation at Line Rate -- GAME: Generative-Based Adaptive Model Extraction Attack -- AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports -- SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection -- Sidechannels We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys -- VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents -- Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange -- BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration. 001449871 506__ $$aAccess limited to authorized users. 001449871 520__ $$aThe three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters. 001449871 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 28, 2022). 001449871 650_0 $$aComputer security$$vCongresses. 001449871 650_0 $$aData encryption (Computer science)$$vCongresses. 001449871 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001449871 650_0 $$aData protection$$vCongresses. 001449871 655_0 $$aElectronic books. 001449871 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001449871 655_7 $$aConference papers and proceedings.$$2lcgft 001449871 7001_ $$aAtluri, Vijay,$$d1956-$$eeditor. 001449871 7001_ $$aDi Pietro, Roberto$$c(Computer scientist),$$eeditor. 001449871 7001_ $$aJensen, Christian D.,$$eeditor. 001449871 7001_ $$aMeng, Weizhi,$$d1986-$$eeditor. 001449871 830_0 $$aLecture notes in computer science ;$$v13554.$$x1611-3349 001449871 852__ $$bebk 001449871 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-17140-6$$zOnline Access$$91397441.1 001449871 909CO $$ooai:library.usi.edu:1449871$$pGLOBAL_SET 001449871 980__ $$aBIB 001449871 980__ $$aEBOOK 001449871 982__ $$aEbook 001449871 983__ $$aOnline 001449871 994__ $$a92$$bISE