


Остановите войну!
for scientists:


default search action
27th ESORICS 2022: Copenhagen, Denmark - Part I
- Vijayalakshmi Atluri
, Roberto Di Pietro
, Christian Damsgaard Jensen
, Weizhi Meng
:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13554, Springer 2022, ISBN 978-3-031-17139-0
Blockchain Security
- Long Meng, Liqun Chen:
A Blockchain-Based Long-Term Time-Stamping Scheme. 3-24 - Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphaël C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. 25-45 - Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl:
Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork. 46-66 - Jayamine Alupotha, Xavier Boyen, Matthew McKague:
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers? 67-88 - Xin Yin
, Zhen Liu
, Guomin Yang
, Guoxing Chen
, Haojin Zhu
:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. 89-109 - Özgür Kesim, Christian Grothoff, Florian Dold, Martin Schanzenbach:
Zero-Knowledge Age Restriction for GNU Taler. 110-129
Privacy
- Mengqi Wei, Wenxing Zhu, Liangkun Cui, Xiangxue Li, Qiang Li:
Privacy Leakage in Privacy-Preserving Neural Network Inference. 133-152 - Ricardo Mendes
, Mariana Cunha
, João P. Vilela
, Alastair R. Beresford
:
Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences. 153-172 - Stéphanie Delaune, Joseph Lallemand:
One Vote Is Enough for Analysing Privacy. 173-194 - Mahawaga Arachchige Pathum Chamikara
, Dongxi Liu, Seyit Camtepe
, Surya Nepal
, Marthie Grobler
, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning. 195-216 - Chengyu Lin, Zeyu Liu, Tal Malkin:
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE. 217-236 - Liron David, Avinatan Hassidim, Yossi Matias, Moti Yung:
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic. 237-255
Crypto
- Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Weihong Han:
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption. 259-282 - Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Josef Pieprzyk
:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. 283-302 - Leixiao Cheng, Fei Meng:
Public Key Authenticated Encryption with Keyword Search from LWE. 303-324 - Francesca Falzon, Kenneth G. Paterson:
An Efficient Query Recovery Attack Against a Graph Encryption Scheme. 325-345 - Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. 346-366 - Massimiliano Albanese
, Karin Johnsgard
, Vipin Swarup
:
A Formal Model for Credential Hopping Attacks. 367-386 - Huanhuan Chen, Shihui Fu, Kaitai Liang:
No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent. 387-407 - Jelle Vos
, Daniël Vos
, Zekeriya Erkin
:
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts. 408-423 - Yi Liu
, Qi Wang
, Siu-Ming Yiu:
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability. 424-443
Attacks
- Xiaoyi Chen
, Yinpeng Dong
, Zeyu Sun, Shengfang Zhai
, Qingni Shen, Zhonghai Wu:
Kallima: A Clean-Label Framework for Textual Backdoor Attacks. 447-466 - Hengxian Song, Jing Liu, Jianing Yang, Xinyu Lei, Gang Xue:
Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism. 467-487 - Mauro Conti
, Denis Donadel
, Radha Poovendran
, Federico Turrin
:
EVExchange: A Relay Attack on Electric Vehicle Charging System. 488-508 - Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks. 509-530 - Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Priyanka Angadi, John Loughner, Matthew Wilden, Nicola Perra, Tina Eliassi-Rad, Alina Oprea:
Cyber Network Resilience Against Self-Propagating Malware Attacks. 531-550 - Kurt Friday, Elie F. Kfoury, Elias Bou-Harb, Jorge Crichigno:
INC: In-Network Classification of Botnet Propagation at Line Rate. 551-569 - Yi Xie
, Mengdie Huang
, Xiaoyu Zhang, Changyu Dong, Willy Susilo
, Xiaofeng Chen:
GAME: Generative-Based Adaptive Model Extraction Attack. 570-588 - Zhenyuan Li, Jun Zeng, Yan Chen, Zhenkai Liang:
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. 589-609 - Xinjing Liu, Zhuo Ma, Yang Liu, Zhan Qin, Junwei Zhang, Zhuzhu Wang:
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection. 610-630
Sidechannels
- Kiran S. Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti
, Gene Tsudik:
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads. 633-652 - Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang:
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents. 653-676 - Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange. 677-697 - Ankit Gangwal
, Shubham Singh, Riccardo Spolaor, Abhijeet Srivastava:
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration. 698-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.