Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13555)
Included in the following conference series:
Conference proceedings info: ESORICS 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows:
Part I: Blockchain security; privacy; crypto; attacks; sidechannels;Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;
Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.Similar content being viewed by others
Keywords
Table of contents (36 papers)
-
Cloud Security
Other volumes
-
Computer Security – ESORICS 2022
-
Computer Security – ESORICS 2022
-
Computer Security – ESORICS 2022
-
Computer Security. ESORICS 2022 International Workshops
Editors and Affiliations
Bibliographic Information
Book Title: Computer Security – ESORICS 2022
Book Subtitle: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II
Editors: Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-17146-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Softcover ISBN: 978-3-031-17145-1Published: 23 September 2022
eBook ISBN: 978-3-031-17146-8Published: 22 September 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXII, 741
Number of Illustrations: 88 b/w illustrations
Topics: Systems and Data Security, Software Engineering, Information Systems Applications (incl. Internet), Computing Milieux, Mobile and Network Security