This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows:
AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 475 pages. 9.25x6.10x9.25 inches. In Stock. This item is printed on demand. N° de réf. du vendeur __3032079004
Quantité disponible : 1 disponible(s)
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
Paperback. Etat : new. Paperback. This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 2224, 2025.The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9783032079008
Quantité disponible : 1 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22 24, 2025.The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows:AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. 454 pp. Englisch. N° de réf. du vendeur 9783032079008
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. N° de réf. du vendeur 2600860693
Quantité disponible : Plus de 20 disponibles
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26404794370
Quantité disponible : 4 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 475 pages. 9.25x6.10x9.25 inches. In Stock. N° de réf. du vendeur x-3032079004
Quantité disponible : 2 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 408359901
Quantité disponible : 4 disponible(s)
Vendeur : CitiRetail, Stevenage, Royaume-Uni
Paperback. Etat : new. Paperback. This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 2224, 2025.The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. N° de réf. du vendeur 9783032079008
Quantité disponible : 1 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18404794376
Quantité disponible : 4 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -.- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns.- Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy.- Functional Credentials: a Practical Construction for the European Digital Identity.- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure.- Breaking verifiability and vote privacy in CHVote.- Zero-Click SnailLoad: From Minimal to No User Interaction.- Analysis of input-output mappings in coinjoin transactions with arbitrary values.- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication.- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection.- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains.- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning.- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard.- RIPOST: Two-Phase Private Decomposition for Multidimensional Data.- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation.- Efficient and Secure Sleepy Model for BFT Consensus.- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference.- An Efficient Security-enhanced Accountable Access Control for Named Data Networking.- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies.- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization.- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance.- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 476 pp. Englisch. N° de réf. du vendeur 9783032079008
Quantité disponible : 1 disponible(s)