Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 14984)
Included in the following conference series:
Conference proceedings info: ESORICS 2024.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024.
The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows:
Part I: Security and Machine Learning.
Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection.
Part III: Software and Systems Security; Applied Cryptopgraphy.
Part IV: Attacks and Defenses; Miscellaneous.
Keywords
Table of contents (21 papers)
-
Software and Systems Security
-
Applied Cryptopgraphy
Other volumes
-
Computer Security – ESORICS 2024
-
Computer Security – ESORICS 2024
-
Computer Security – ESORICS 2024
-
Computer Security – ESORICS 2024
Editors and Affiliations
Bibliographic Information
Book Title: Computer Security – ESORICS 2024
Book Subtitle: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part III
Editors: Joaquin Garcia-Alfaro, Rafał Kozik, Michał Choraś, Sokratis Katsikas
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-70896-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2024
Softcover ISBN: 978-3-031-70895-4Published: 06 September 2024
eBook ISBN: 978-3-031-70896-1Published: 05 September 2024
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVII, 446
Number of Illustrations: 37 b/w illustrations, 95 illustrations in colour
Topics: Systems and Data Security, Cryptology, Security Services, Mobile and Network Security, Computer Communication Networks, Computer System Implementation