Limit search to available items
Book Cover
E-book
Author European Symposium on Research in Computer Security (25th : 2020 : Online)

Title Computer security -- ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings. Part II / Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider (eds.)
Published Cham : Springer, 2020

Copies

Description 1 online resource (769 pages)
Series Lecture Notes in Computer Science ; 12309
LNCS sublibrary, SL 4, Security and cryptology
Lecture notes in computer science ; 12309.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Organization -- Keynotes -- Decentralising Information and Communications Technology: Paradigm Shift or Cypherpunk Reverie? -- Lattices and Zero-Knowledge -- Accountability in Computing -- Contents -- Part II -- Contents -- Part I -- Formal Modelling -- Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols -- 1 Introduction -- 2 Overview -- 3 Tamarin Syntax and Semantics -- 3.1 Term Algebra -- 3.2 Transition System -- 3.3 Execution Traces -- 3.4 Properties -- 4 Automatically Generated Sources Lemmas -- 4.1 Definitions
4.2 Algorithm -- 4.3 Dealing with Composed Rules -- 5 Implementation and Experimental Evaluation -- 6 Conclusion -- A Proofs of Theorems 1 and 2 -- References -- When Is a Test Not a Proof? -- 1 Introduction -- 1.1 Addressing the Problem -- 1.2 Our Contribution -- 2 The Jakobsson-Juels PET -- 2.1 Plaintext Equivalence Test -- 2.2 Why the PET Is Not a Proof -- 3 Flaws in a Practical Implementation of the PEP -- 3.1 Use of Zero Knowledge Proofs (ZKPs) -- 3.2 Making Equivalent Ciphertexts Look Different -- 3.3 Making Encryptions of Different Messages Look Equivalent
3.4 Summary and Implications of These Vulnerabilities -- 4 Why this Undermines Universal Verifiability in JCJ/Civitas and Other Protocols -- 4.1 JCJ/Civitas -- 4.2 A Linear-Time Enhancement to JCJ -- 4.3 Introduction to Cryptography Textbook -- 4.4 Pretty Good Democracy -- 4.5 Selections -- 4.6 Cobra -- 4.7 Caveat Coercitor -- 4.8 Universally Verifiable Auctions -- 5 Correcting the Problems to Achieve UV -- 5.1 The Fiat-Shamir Transform -- 5.2 The Correct Plaintext Equivalence Proof -- 5.3 Security Proof for the Corrected PEP -- 6 Discussion and Conclusion -- References
Hardware Fingerprinting for the ARINC 429 Avionic Bus -- 1 Introduction -- 1.1 Background -- 1.2 Related Work -- 1.3 Contributions -- 2 Preliminaries -- 2.1 The ARINC 429 Standard -- 2.2 The Adversary Model -- 3 The Data Set -- 4 The Hardware Fingerprinting Approach -- 4.1 IDS Overview -- 4.2 Anomaly Detection per Segment -- 4.3 Voting -- 4.4 Suspicion Counter -- 5 Signal Segmentation -- 6 Feature Sets -- 7 Detection Based on a Single Word -- 7.1 Methodology -- 7.2 Identifying a Rogue Transmitter -- 8 Modeling the Suspicion Counter -- 9 Performance of the Complete Method -- 10 Conclusions
Summary The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain
Notes International conference proceedings
"Due to the global COVID-19 pandemic, the conference and workshops ran virtually, hosted by the University of Surrey, UK."--Preface
Bibliography References-Applied Cryptography I-Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition-1 Introduction-1.1 Background-1.2 Our Contribution-1.3 Related Work-2 Preliminaries-2.1 Identity-Based Key Encapsulation Mechanism-2.2 Security Definitions for IB-KEM-3 Simulation-Based Definition of Anonymity-3.1 Defining Ano-SS for IB-KEM-3.2 Proof that Ano-SS Implies Ano-LOR-4 Equivalence Between Ano-LOR and Ano-SS-5 Discussion
Notes A Attempt to Define Anonymity Based on Goldwasser and Micali's Approach
Print version record
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Application software.
Software engineering.
Network security.
Network hardware.
Information retrieval.
Expert systems -- knowledge-based systems.
Software Engineering.
Computer security.
Computers -- Networking -- Security.
Computers -- Hardware -- Network Hardware.
Computers -- Information Technology.
Computers -- Expert Systems.
Computers -- Software Development & Engineering -- General.
Computers -- Security -- General.
Application software
Computer networks -- Security measures
Computer security
Software engineering
Genre/Form Electronic books
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Chen, Liqun
Li, Ninghui (Computer scientist)
Liang, Kaitai
Schneider, S. A. (Steve A.)
ISBN 9783030590130
3030590135
Other Titles ESORICS 2020