Computer Security - ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV / [electronic resource] :
edited by Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis.
- 1st ed. 2024.
- XV, 432 p. 119 illus., 92 illus. in color. online resource.
- Lecture Notes in Computer Science, 14347 1611-3349 ; .
- Lecture Notes in Computer Science, 14347 .
Crypto -- Network, web and internet -- Privacy -- Remote -- Attacks -- Blockchain -- Miscellaneous -- Machine learning -- Software and systems security.
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.
9783031514821
10.1007/978-3-031-51482-1 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Computer networks .
Computer systems.
Data and Information Security.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer System Implementation.
QA76.9.A25
005.8
Crypto -- Network, web and internet -- Privacy -- Remote -- Attacks -- Blockchain -- Miscellaneous -- Machine learning -- Software and systems security.
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.
9783031514821
10.1007/978-3-031-51482-1 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Computer networks .
Computer systems.
Data and Information Security.
Cryptology.
Security Services.
Mobile and Network Security.
Computer Communication Networks.
Computer System Implementation.
QA76.9.A25
005.8