000914764 000__ 04499cam\a2200541Ii\4500 000914764 001__ 914764 000914764 005__ 20230306150541.0 000914764 006__ m\\\\\o\\d\\\\\\\\ 000914764 007__ cr\cn\nnnunnun 000914764 008__ 190924s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000914764 020__ $$a9783030299620$$q(electronic book) 000914764 020__ $$a3030299627$$q(electronic book) 000914764 020__ $$z9783030299613 000914764 0247_ $$a10.1007/978-3-030-29962-0$$2doi 000914764 035__ $$aSP(OCoLC)on1120754334 000914764 035__ $$aSP(OCoLC)1120754334 000914764 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKMGB$$dOCLCF$$dEBLCP 000914764 049__ $$aISEA 000914764 050_4 $$aQA76.9.A25 000914764 08204 $$a005.8$$223 000914764 1112_ $$aEuropean Symposium on Research in Computer Security$$n(24th :$$d2019 :$$cLuxembourg) 000914764 24510 $$aComputer security -- ESORICS 2019 :$$b24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings.$$nPart II /$$cKazue Sako, Steve Schneider, Peter Y. A. Ryan (eds.). 000914764 2463_ $$aESORICS 2019 000914764 264_1 $$aCham :$$bSpringer,$$c2019. 000914764 300__ $$a1 online resource (xxvi, 627 pages) :$$billustrations. 000914764 336__ $$atext$$btxt$$2rdacontent 000914764 337__ $$acomputer$$bc$$2rdamedia 000914764 338__ $$aonline resource$$bcr$$2rdacarrier 000914764 4901_ $$aLecture notes in computer science ;$$v11736 000914764 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000914764 500__ $$aInternational conference proceedings. 000914764 500__ $$aIncludes author index. 000914764 5050_ $$aSoftware Security.- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs.- Uncovering Information Flow Policy Violations in C Programs.- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.- Static Detection of Uninitialized Stack Variables in Binary Code.- Towards Automated Application-Specific Software Stacks.- Cryptographic Protocols.- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices.- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.- Feistel Structures for MPC, and More.- Arithmetic Garbling from Bilinear Maps.- Security Models.- SEPD: An Access Control Model for Resource Sharing in an IoT Environment.- Nighthawk: Transparent System Introspection from Ring -3.- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.- Searchable Encryption.- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.- Generic Multi-keyword Ranked Search on Encrypted Cloud Data.- An Efficiently Searchable Encrypted Data Structure for Range Queries.- Privacy.- GDPiRated -- Stealing Personal Information On- and Offline.- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.- OCRAM-assisted Sensitive Data Protection on ARM-based Platform.- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping.- Key Exchange Protocols.- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography.- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope.- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.- Web Security.- The Risks of WebGL: Analysis, Evaluation and Detection.- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks.- Fingerprint Surface-Based Detection of Web Bot Detectors.- Testing for Integrity Flaws in Web Sessions. 000914764 506__ $$aAccess limited to authorized users. 000914764 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 24, 2019). 000914764 650_0 $$aComputer security$$vCongresses. 000914764 650_0 $$aData encryption (Computer science)$$vCongresses. 000914764 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000914764 650_0 $$aData protection$$vCongresses. 000914764 7001_ $$aSako, Kazue$$c(Innovation Producer),$$eeditor. 000914764 7001_ $$aSchneider, S. A.$$q(Steve A.),$$eeditor. 000914764 7001_ $$aRyan, Peter,$$d1957-$$eeditor. 000914764 830_0 $$aLecture notes in computer science ;$$v11736. 000914764 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000914764 852__ $$bebk 000914764 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-29962-0$$zOnline Access$$91397441.1 000914764 909CO $$ooai:library.usi.edu:914764$$pGLOBAL_SET 000914764 980__ $$aEBOOK 000914764 980__ $$aBIB 000914764 982__ $$aEbook 000914764 983__ $$aOnline 000914764 994__ $$a92$$bISE