Podcast Episode Details

Back to Podcast Episodes
Computer Security -- ESORICS 2013

Computer Security -- ESORICS 2013



The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers discuss topics like developing protocols for secure multi-party computation, designing secure key generation schemes, improving malware detection techniques by using static reachability analysis, and implementing accountability mechanisms for randomized computations. The authors also investigate ways to strengthen security in web browsers and other software applications by analyzing potential vulnerabilities and designing robust defense mechanisms against various attacks, such as timing channels, relay attacks, and DNS poisoning. Several papers also explore the use of formal methods and game theory to analyze the security of protocols and systems, providing a rigorous mathematical framework for understanding and proving their security properties.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Computer-Security-ESORICS-2013-Proceedings/dp/364240202X?&linkCode=ll1&tag=cvthunderx-20&linkId=227f22cf34c4fa11f381b42bcb0c4418&language=en_US&ref_=as_li_ss_tl


Published on 6 months, 2 weeks ago






If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate