LEADER 05129nam 22007455 450 001 9911047656503321 005 20251012130402.0 010 $a3-032-07901-2 024 7 $a10.1007/978-3-032-07901-5 035 $a(MiAaPQ)EBC32342991 035 $a(Au-PeEL)EBL32342991 035 $a(CKB)41621552200041 035 $a(DE-He213)978-3-032-07901-5 035 $a(EXLCZ)9941621552200041 100 $a20251012d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security ? ESORICS 2025 $e30th European Symposium on Research in Computer Security, Toulouse, France, September 22?24, 2025, Proceedings, Part IV /$fedited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (753 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16056 311 08$a3-032-07900-4 327 $a -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don?t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains. 330 $aThis four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22?24, 2025. The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16056 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputer systems 606 $aData and Information Security 606 $aCryptology 606 $aSecurity Services 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer System Implementation 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputer systems. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 676 $a005.8 700 $aNicomette$b Vincent$01860745 701 $aBenzekri$b Abdelmalek$01860746 701 $aBoulahia-Cuppens$b Nora$01860747 701 $aVaidya$b Jaideep$01276751 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047656503321 996 $aComputer Security ? ESORICS 2025$94466483 997 $aUNINA