Computer Security. ESORICS 2024 International Workshops

Computer Security. ESORICS 2024 International Workshops

DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I

Pawlicki, Marek; Barker, Ken; Katsikas, Sokratis; Delgado-Segura, Sergi; Navarro-Arribas, Guillermo; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Lambrinoudakis, Costas; Perez-Sola, Cristina; Cuppens-Boulahia, Nora

Springer International Publishing AG

04/2025

526

Mole

9783031823480

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
Establishing Secure and Privacy-Preserving Blockchain Applications Through Real World Cryptography. DPM Papers: Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering.- reteLLMe: Design rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions.- Plausible Deniability of Redacted Text.- Exploring Distribution Learning of Synthetic Data Generators for Manifolds.- HEDAS: Secure and Efficient Distributed OLAP using Fully Homomorphic Encryption.- Card-based Cryptographic Protocols for Three-input Functions with a Standard Deck of Cards Using Private Operations.- Grid-Based Decompositions for Spatial Data under Local Differential Privacy.- Balancing Privacy and Utility in Multivariate Time-Series Classification.- Dynamic k-anonymity: A Topological Framework.- Using Static Code Analysis for GDPR Compliance Checks.- Privacy-preserving tabular data generation: Systematic Literature Review.- A DPIA Repository for Interdisciplinary Data Protection Research.- Secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification. CBT Papers: Route Discovery in Private Payment Channel Networks.- A comparative study of Rust smart contract SDKs for Application-Specific Blockchains.- Offchain Runtime Verification (for The Tezos Blockchain).- Quantifying Liveness and Safety of Avalanche's Snowball.- We will DAG you.- Assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?.- Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script.- Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol.- Benchmarking post-quantum cryptography in Ethereum-based blockchains. CyberICPS Papers: Exploring Anomaly Detection for Marine Radar Systems.- Hunting Vulnerabilities in the Maritime Domain.- Threat Modeling in Satellite Communications for Maritime Operations.- Cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway.- Usage of Cybersecurity Standards in Operational Technology Systems.- Deployment Challenges of Industrial Intrusion Detection Systems.- A Framework For Applying Digital Twins To Support Incident Response.- Automated Side-Channel Analysis of ARM TrustZone-M Programs.- FrameD: Toward Automated Identication of Embedded Frameworks in Firmware Images.- Leveraging the domain experts: specializing privacy threat knowledge.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Privacy;Machine Learning;Applied Cryptography;Privacy Assessment;Blockchain;Cryptocurrency;Layer 2;Cyber Physical Systems Security;Cyber Security;IoT security