Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Security and Trust Management -

Security and Trust Management

21st International Workshop, STM 2025, Toulouse, France, September 25–26, 2025, Proceedings
Buch | Softcover
VIII, 244 Seiten
2025
Springer International Publishing (Verlag)
978-3-032-06154-6 (ISBN)
CHF 74,85 inkl. MwSt

This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25 26, 2025.

The 13 full papers presented in this book were carefully reviewed and selected from 26 submissions. 

They were organized in topical sections as follows: Identity Management, Authentication, Access Control & Formal Modeling; AI & Machine Learning for Security; Cybersecurity Strategies, Regulations, Privacy; Cryptography & Threat Analysis.

.- Identity Management, Authentication, Access Control & Formal
Modeling.

.- Toward Secure and Trustworthy Identity Management Systems: A
Knowledge-base Driven Approach.

.- Always Authenticated, Never Exposed: Continuous Authentication via
Zero-Knowledge Proofs.

.- Pragmatic guidelines for formal modeling of security ceremonies.

.- Access Control Administration for Smart Homes.

.- AI & Machine Learning for Security.

.- Parameter-Efficient Fine-Tuning of LLMs for Intrusion Detection and
Firewall Rule Generation: A Comparative Study.

.- ABusing social media & sentiment analysis for stock market prediction.

.- DrATC+: A Divide et Impera Extension to Trust-Based Dynamic Routing.

.- Cybersecurity Strategies, Regulations, Privacy.

.- How to Train Your Guardian: Evaluating Cyber Security Exercises
Using Situation Awareness.

.- Towards an architecture for managing security under the EU Cyber
Resilience Act.

.- Google Tag Manager and its Privacy Issues.

.- Cryptography & Threat Analysis.

.- Measuring Modern Phishing Tactics: A Quantitative Study of Body
Obfuscation Prevalence, Co-occurrence, and Filter Impact.

.- Nicknames for Group Signatures.

.- The Impact of Filtering in Differential Cryptanalysis: A Case Study on
FEAL-8.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo VIII, 244 p. 37 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Access control and Usage control • anonymity • Authentication and Identity management • Data and Application Security • Digital rights management • Economics of Security and Privacy • Formal Methods for Security and Trust • legal and ethical issues • Mobile Security • Networked Systems Security • operating systems security • privacy • Social implications of security and trust • Trust
ISBN-10 3-032-06154-7 / 3032061547
ISBN-13 978-3-032-06154-6 / 9783032061546
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95