庄严 发表于 2025-3-28 16:36:14

TurboTLS: TLS Connection Establishment with 1 Less Round Tripo-client flows of the TLS handshake are sent over UDP rather than TCP. At the same time, in the same flights, the three-way TCP handshake is carried out. Once the TCP connection is established, the client and server can complete the final flight of the TLS handshake over the TCP connection and conti

mortgage 发表于 2025-3-28 21:47:45

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructuresto enhance the security and privacy of DNS transmissions. As more software and devices support encrypted DNS protocols, adopting encrypted DNS is fast becoming the prevailing trend in domain name resolution. Despite this growing trend, the dependencies within the encrypted DNS infrastructures remain

lattice 发表于 2025-3-29 00:45:12

http://reply.papertrans.cn/25/2423/242294/242294_43.png

食草 发表于 2025-3-29 04:39:58

: Detecting and Isolating Mercurial Cores at the Booting Stageor failure, can randomly return silent miscomputation results and have been discovered in commercial CPUs. To address the mercurial core problem, we propose BootRIST, a software-based solution to detect and isolate mercurial cores in CPUs at the booting stage. BootRIST provides a framework to execut

该得 发表于 2025-3-29 10:38:25

Social Control and Interactivity in Anonymous Public Eventsffer a rich set of interactive features such as live chat and gestures, enabling dynamic and engaging social events. In public events, however, participants are not well-known entities originating from the same institution, and thus traditional access control fails to provide means for maintaining o

eardrum 发表于 2025-3-29 15:16:13

http://reply.papertrans.cn/25/2423/242294/242294_46.png

neutral-posture 发表于 2025-3-29 15:55:49

http://reply.papertrans.cn/25/2423/242294/242294_47.png

引起 发表于 2025-3-29 20:52:33

http://reply.papertrans.cn/25/2423/242294/242294_48.png

Consensus 发表于 2025-3-30 00:12:54

Confidential and Verifiable Machine Learning Delegations on the Cloud advantageous for both companies and individual users. However, the security of cloud computing has emerged as a significant concern. Particularly, Cloud Service Providers (CSPs) cannot assure data confidentiality and computations integrity in mission-critical applications. In this paper, we propose

Grandstand 发表于 2025-3-30 04:30:26

Process Identity-Based Firewallingred from local-system level knowledge of processes and their access to specific sockets, without needing to examine the user data. In order to ensure its reliable operation in microservice-rich environments, we extend the process identification capabilities to function across namespaces, thus allowi
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computer Security – ESORICS 2024; 29th European Sympos Joaquin Garcia-Alfaro,Rafał Kozik,Sokratis Katsika Conference proceedings 2024 The E