Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Sako, Kazue"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, I, 155-183
ACNS (2)
Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, I, 155-183
In light of more data than ever being stored using cloud services and the request by the public for secure, privacy-enhanced, and easy-to-use systems, Searchable Encryption schemes were introduced. These schemes enable privacy-enhanced search among e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f92f9d4e517f96c4fb7ecd1b9a29040
https://doi.org/10.1007/978-3-030-78375-4_7
https://doi.org/10.1007/978-3-030-78375-4_7
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
Applied Cryptography and Network Security-19th International Conference, ACNS 2021, Proceedings, 12727(19)
ACNS (2)
Applied Cryptography and Network Security-19th International Conference, ACNS 2021, Proceedings, 12727(19)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the mal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::093213a48dd20c05e267210c957aa54d
https://doi.org/10.1007/978-3-030-78375-4_4
https://doi.org/10.1007/978-3-030-78375-4_4
Autor:
Jonker, Hugo, Krumnow, Benjamin, Vlot, Gabry, Sako, Kazue, Schneider, Steve, Ryan, Peter Y.A.
Publikováno v:
Jonker, H, Krumnow, B & Vlot, G 2019, Fingerprint Surface-Based Detection of Web Bot Detectors . in K Sako, S Schneider & P Y A Ryan (eds), Computer Security-ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II . Springer, Cham, Lecture Notes in Computer Science (LNCS), vol. 11736, pp. 586-605 . https://doi.org/10.1007/978-3-030-29962-0_28
Lecture Notes in Computer Science ISBN: 9783030299613
ESORICS (2)
Computer Security-ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II, 586-605
STARTPAGE=586;ENDPAGE=605;TITLE=Computer Security-ESORICS 2019
Lecture Notes in Computer Science ISBN: 9783030299613
ESORICS (2)
Computer Security-ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II, 586-605
STARTPAGE=586;ENDPAGE=605;TITLE=Computer Security-ESORICS 2019
Web bots are used to automate client interactions with websites, which facilitates large-scale web measurements. However, websites may employ web bot detection. When they do, their response to a bot may differ from responses to regular browsers. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::87f62f95c92e6c2044800382ebc3cf2e
https://research.ou.nl/en/publications/7e71fdd1-36c3-4d36-a10f-8ff5729974b3
https://research.ou.nl/en/publications/7e71fdd1-36c3-4d36-a10f-8ff5729974b3