Active Re-identification Attacks on Periodically Released Dynamic Social Graphs

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 2
1. Verfasser: Chen, Xihui (VerfasserIn)
Weitere Verfasser: Këpuska, Ema (VerfasserIn), Mauw, Sjouke (VerfasserIn), Ramírez-Cruz, Yunior (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
When Is a Test Not a Proof? 2020 McMurtry, Eleanor
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorohic Encryption 2020 Susilo, Willy
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 2020 Hanaoka, Goichiro
Linear Attack on Round-Reduced DES Using Deep Learning 2020 Hou, Botao
Detection by Attack: Detecting Adversarial Samples by Undercover Attack 2020 Zhou, Qifei
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA 2020 Aparicio-Sánchez, Damián
On the Privacy Risks of Compromised Trigger-Action Platforms 2020 Chiang, Yu-Hsi
Certifying Decision Trees Against Evasion Attacks by Program Analysis 2020 Calzavara, Stefano
Understanding Object Detection Through an Adversarial Lens 2020 Chow, Ka-Ho
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE 2020 Costache, Anamaria
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain 2020 Sun, Hanyi
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC 2020 Dalskov, Anders
On Private Information Retrieval Supporting Range Queries 2020 Hayata, Junichiro
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication 2020 Paul, Sebastian
Security Analysis Linear-Complexity Private Function Evaluation is Practical 2020 Holz, Marco
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization 2020 Mosli, Rayan
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys 2020 Janovsky, Adam
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation 2020 Küennemann, Robert
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols 2020 Cortier, Véronique
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing 2020 Boyen, Xavier
Alle Artikel auflisten