CyberSecurity Summary

Computer Security -- ESORICS 2013


Listen Later

The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers discuss topics like developing protocols for secure multi-party computation, designing secure key generation schemes, improving malware detection techniques by using static reachability analysis, and implementing accountability mechanisms for randomized computations. The authors also investigate ways to strengthen security in web browsers and other software applications by analyzing potential vulnerabilities and designing robust defense mechanisms against various attacks, such as timing channels, relay attacks, and DNS poisoning. Several papers also explore the use of formal methods and game theory to analyze the security of protocols and systems, providing a rigorous mathematical framework for understanding and proving their security properties.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Computer-Security-ESORICS-2013-Proceedings/dp/364240202X?&linkCode=ll1&tag=cvthunderx-20&linkId=227f22cf34c4fa11f381b42bcb0c4418&language=en_US&ref_=as_li_ss_tl

...more
View all episodesView all episodes
Download on the App Store

CyberSecurity SummaryBy CyberSecurity Summary