


default search action
30th ESORICS 2025: Toulouse, France - Part IV
- Vincent Nicomette

, Abdelmalek Benzekri
, Nora Boulahia-Cuppens
, Jaideep Vaidya
:
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part IV. Lecture Notes in Computer Science 16056, Springer 2026, ISBN 978-3-032-07900-8 - Mehrdad Bahrini, Alexander Herbst, Merle Freye, Matthias Kohn, Karsten Sohr, Rainer Malaka:

Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. 1-21 - Berkay Kemal Balioglu, Alireza Khodaie, Mehmet Emre Gursoy:

Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. 22-42 - Giovanni Bartolomeo:

Functional Credentials: A Practical Construction for the European Digital Identity. 43-62 - Jialin Chi, Cheng Hong, Axin Wu, Tianqi Sun, ZheChen Li, Min Zhang, Dengguo Feng:

Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. 63-85 - Véronique Cortier, Alexandre Debant, Pierrick Gaudry:

Breaking Verifiability and Vote Privacy in CHVote. 86-105 - Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss, Johanna Ullrich:

Zero-Click SnailLoad: From Minimal to No User Interaction. 106-125 - Jiri Gavenda, Petr Svenda, Stanislav Bobon, Vladimir Sedlacek:

Analysis of Input-Output Mappings in Coinjoin Transactions with Arbitrary Values. 126-146 - Bingyang Guo, Mingxuan Liu, Yihui Ma, Ruixuan Li, Fan Shi, Min Zhang, Baojun Liu, Chengxi Xu, Haixin Duan, Geng Hong, Min Yang, Qingfeng Pan:

Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. 147-168 - Howard Halim, Eyasu Getahun Chekole, Daniël Reijsbergen, Jianying Zhou:

BlowPrint: Blow-Based Multi-factor Biometrics for Smartphone User Authentication. 169-189 - Zhicheng Huang, Fengyuan Xu, Jiahong Yang, Wenting Li, Zonghua Zhang, Chenbin Zhang, Meng Ma, Ping Wang:

GET-AID: Graph-Enhanced Transformer for Provenance-Based Advanced Persistent Threats Investigation and Detection. 190-210 - Bhavani Kalal, Abdulrahman Alhaidari, Balaji Palanisamy, Shamik Sural:

The Economics of Deception: Structural Patterns of Rug Pull Across DeFi Blockchains. 211-232 - Youcef Korichi, Josée Desharnais, Sébastien Gambs, Nadia Tawbi:

Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. 233-252 - Pascal Lafourcade, Elsa López Pérez, Charles Olivier-Anclin, Cristina Onete, Clément Papon, Malisa Vucinic:

Fine-Grained, Privacy-Augmenting LI-Compliance in the LAKE Standard. 253-273 - Ala Eddine Laouir, Abdessamad Imine:

RIPOST: Two-Phase Private Decomposition for Multidimensional Data. 274-293 - Takumi Namiki, Takumi Amada, Mitsugu Iwamoto, Yohei Watanabe:

Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. 294-313 - Pengkun Ren, Hai Dong, Zahir Tari, Pengcheng Zhang:

Efficient and Secure Sleepy Model for BFT Consensus. 314-333 - Silei Ren, Cosku Acay, Andrew C. Myers:

An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. 334-353 - Jianfei Sun, Yuxian Li, Xuehuan Yang, Guomin Yang, Robert H. Deng:

An Efficient Security-Enhanced Accountable Access Control for Named Data Networking. 354-373 - Yansen Xin, Rui Zhang, Zhenglin Fan, Ze Jia:

Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. 374-394 - Osama Zafar, Mina Namazi, Yuqiao Xu, Youngjin Yoo, Erman Ayday:

A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. 395-414 - Qingming Zeng, Mo Li, Ximing Fu, Hui Jiang, Chuanyi Liu:

Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. 415-432 - Wanying Zeng, Lijia Xie, Xiao Zhang:

Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains. 433-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














