↓ Skip to main content

Computer Security – ESORICS 2020

Overview of attention for book
Cover of 'Computer Security – ESORICS 2020'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols
  3. Altmetric Badge
    Chapter 2 When Is a Test Not a Proof?
  4. Altmetric Badge
    Chapter 3 Hardware Fingerprinting for the ARINC 429 Avionic Bus
  5. Altmetric Badge
    Chapter 4 Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
  6. Altmetric Badge
    Chapter 5 SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval
  7. Altmetric Badge
    Chapter 6 Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
  8. Altmetric Badge
    Chapter 7 Linear Attack on Round-Reduced DES Using Deep Learning
  9. Altmetric Badge
    Chapter 8 Detection by Attack: Detecting Adversarial Samples by Undercover Attack
  10. Altmetric Badge
    Chapter 9 Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems
  11. Altmetric Badge
    Chapter 10 Active Re-identification Attacks on Periodically Released Dynamic Social Graphs
  12. Altmetric Badge
    Chapter 11 Fooling Primality Tests on Smartcards
  13. Altmetric Badge
    Chapter 12 An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA
  14. Altmetric Badge
    Chapter 13 On the Privacy Risks of Compromised Trigger-Action Platforms
  15. Altmetric Badge
    Chapter 14 Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces
  16. Altmetric Badge
    Chapter 15 Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
  17. Altmetric Badge
    Chapter 16 CSH: A Post-quantum Secret Handshake Scheme from Coding Theory
  18. Altmetric Badge
    Chapter 17 A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
  19. Altmetric Badge
    Chapter 18 A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
  20. Altmetric Badge
    Chapter 19 Post-Quantum Adaptor Signatures and Payment Channel Networks
  21. Altmetric Badge
    Chapter 20 Linear-Complexity Private Function Evaluation is Practical
  22. Altmetric Badge
    Chapter 21 Certifying Decision Trees Against Evasion Attacks by Program Analysis
  23. Altmetric Badge
    Chapter 22 They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization
  24. Altmetric Badge
    Chapter 23 Understanding Object Detection Through an Adversarial Lens
  25. Altmetric Badge
    Chapter 24 Signatures with Tight Multi-user Security from Search Assumptions
  26. Altmetric Badge
    Chapter 25 Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys
  27. Altmetric Badge
    Chapter 26 MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation
  28. Altmetric Badge
    Chapter 27 Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE
  29. Altmetric Badge
    Chapter 28 How to Model the Bribery Attack: A Practical Quantification Method in Blockchain
  30. Altmetric Badge
    Chapter 29 Updatable Blockchains
  31. Altmetric Badge
    Chapter 30 PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution
  32. Altmetric Badge
    Chapter 31 Identity-Based Authenticated Encryption with Identity Confidentiality
  33. Altmetric Badge
    Chapter 32 Securing DNSSEC Keys via Threshold ECDSA from Generic MPC
  34. Altmetric Badge
    Chapter 33 On Private Information Retrieval Supporting Range Queries
  35. Altmetric Badge
    Chapter 34 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
  36. Altmetric Badge
    Chapter 35 Generic Superlight Client for Permissionless Blockchains
  37. Altmetric Badge
    Chapter 36 LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
26 X users
patent
3 patents

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer Security – ESORICS 2020
Published by
Springer International Publishing, January 2020
DOI 10.1007/978-3-030-59013-0
ISBNs
978-3-03-059012-3, 978-3-03-059013-0
Editors

Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider

X Demographics

X Demographics

The data shown below were collected from the profiles of 26 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Unspecified 1 100%
Readers by discipline Count As %
Unspecified 1 100%