Administration of Machine Learning Based Access Control

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 2
1. Verfasser: Nobi, Mohammad Nur (VerfasserIn)
Weitere Verfasser: Krishnan, Ram (VerfasserIn), Huang, Yufei (VerfasserIn), Sandhu, Ravi (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost 2022 Susilo, Willy
Utility-Preserving Biometric Information Anonymization 2022 Moriarty, Bill
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay 2022 Zheng, Yubo
Real-Time Policy Enforcement with Metric First-Order Temporal Logic 2022 Hublet, François
Sequential Digital Signatures for Cryptographic Software-Update Authentication 2022 Poettering, Bertram
Deterministic Wallets for Adaptor Signatures 2022 Erwig, Andreas
IoTEnsemble: Detection of Botnet Attacks on Internet of Things 2022 Li, Ruoyu
Collaborative Anomaly Detection System for Charging Stations 2022 Cumplido, Jesus
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users 2022 Wagner, Isabel
A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components 2022 Aldoseri, Abdulla
The Revenge of Password Crackers: Automated Training of Password Cracking Tools 2022 Campi, Alessia Michela Di
Fuzzy Authenticated Key Exchange with Tight Security 2022 Jiang, Mingming
Ring Signatures with User-Controlled Linkability 2022 Fiore, Dario
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero 2022 Thyagarajan, Sri AravindaKrishnan
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing 2022 Bootle, Jonathan
Puncturable Signature: A Generic Construction and Instantiations 2022 Jiang, Mei
Anonymous Traceback for End-to-End Encryption 2022 Kenney, Erin
Verifying the Quality of Outsourced Training on Clouds 2022 Li, Peiyang
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption 2022 Wang, Xingkai
Robust and Scalable Process Isolation Against Spectre in the Cloud 2022 Schwarzl, Martin
Alle Artikel auflisten