Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Security -

Information Security

28th International Conference, ISC 2025, Seoul, South Korea, October 20–22, 2025, Proceedings

Sang Kil Cha, Jeongeun Park (Herausgeber)

Buch | Softcover
XIII, 604 Seiten
2025
Springer International Publishing (Verlag)
978-3-032-08123-0 (ISBN)
CHF 122,80 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20 22, 2025.

The 28 full papers presented in these proceedings were carefully reviewed and selected from 77 submissions. The papers are organized in the following topical sections: Cryptanalysis and Cipher Security; Network Security; Post-quantum Cryptography; Side-Channel Attacks and Countermeasures; AI Security; Biometric Security; Malware Analysis; Systems Security; Access Control & Privacy; Smart Contracts and Blockchain Security.

.-Cryptanalysis and Cipher Security.-Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA.-Keyless Physical-Layer Cryptography.-The Multi-User Security of GCM-SST and Further Enhancements.-Network Security.- SimSeq: A Robust TLS Traffic Classification Method.-EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game Theory.-A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? .-Post-quantum Cryptography.-Conditional Attribute-Based PRE: Definition and Construction from LWE.-LastRings: Lattice-based Scalable Threshold Ring Signatures.-Side-Channel Attacks and Countermeasures.-Simulation-based Software Leakage Evaluation for the RISC-V Platform.-GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect Replacement.-Inference Attacks on Encrypted Online Voting via Traffic Analysis.-Towards Cross-Device Side-Channel Analysis via Domain-Level Attention Mechanisms.-Tighter Bounds for Guessing Entropy in Side-channel Template Attacks.-Collision Spanning Tree: Quick Key Recovery in Side-Channel Collision Attacks.-AI Security.-MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perception.-Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning.-Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images.-Biometric Security.-Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures.-A New Code-Based Formulation of the Fuzzy Vault Scheme.-Malware Analysis.-HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection.-Towards Architecture-Independent Function Call Analysis for IoT Malware.-A Study on Malicious Browser Extensions in 2025.-HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection.-Systems Security
.-A Graph-Based Approach to Alert Contextualisation in Security Operations Centres.-HyperSec: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection.-BootMarker: UEFI Bootkit Defense via Control-Flow Verification.-Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment.-Access Control & Privacy.-CryptNyx: Password-hardened encryption with strong anonymity guarantees.-Efficient Dynamic Group Signatures with Forward Security.-Zero Trust Continuous Authentication Models and Automated Policy Formulation.-Smart Contracts and Blockchain Security.-Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts
.-BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIII, 604 p. 169 illus., 141 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte anonymity • Attack • cryptography • Defense • Exploitation • Malware • privacy • security
ISBN-10 3-032-08123-8 / 3032081238
ISBN-13 978-3-032-08123-0 / 9783032081230
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95