Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Information and Computer Security -

Advances in Information and Computer Security

20th International Workshop on Security, IWSEC 2025, Fukuoka, Japan, November 25–27, 2025, Proceedings

Carlos Cid, Naoto Yanai (Herausgeber)

Buch | Softcover
554 Seiten
2025
Springer Verlag, Singapore
978-981-95-4673-2 (ISBN)
CHF 98,85 inkl. MwSt
  • Noch nicht erschienen - erscheint am 16.12.2025
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2025, held in Fukuoka, Japan, in November 25, 2025.


The 27 full papers were carefully reviewed and selected from 95 submissions. These papers were categorized into the following sections: Public-Key Encryption; Signature Schemes; Security and Analysis of Post-Quantum Cryptography; Card-Based Cryptography; Protocols; Privacy-Preserving Techniques; AI Attacks and Mitigations; Vulnerability Detection; Cache & Code-Execution: Attacks and Mitigations; Cyber Attack & Threat Analysis; Wireless Communication Security and Human Factors in Cyber Security.

.- Public-Key Encryption.


.- Dynamic Collusion Function-Private Functional Encryption.


.- Public Key Encryption with Equality Test from Tag-Based Encryption.


.-  Approximate CRT-Based Gadget Decomposition for Fully
Homomorphic Encryption.


.- Signature Schemes.


.- Ordered Multi-Signatures with Public-Key Aggregation from SXDH
Assumption.


.- Multi-Designated Verifier Ring Signature: Generic Construction from
Standard Primitives.


.- Security and Analysis of Post-Quantum Cryptography.


.- An Extended Rectangular MinRank Attack against UOV and Its Variants.


.- Refined Analysis of the Concrete Hardness of the Quasi-Cyclic
Syndrome Decoding.


.- Practical Lattice Attack and Patched Parameters for 2F Multivariate
Encryption: Is 2F Still Better Than Standard Lattice Constructions for
Small Ciphertext Size?.


.- Cryptanalysis of the best HFE-LL’ Constructions.


.- Card-Based Cryptography.


.- Efficient Card-Based Protocols for Symmetric and Partially Doubly
Symmetric Functions.


.- Minimum number of up-down cards for finite-time committed-AND
protocol without interlocking operations. 


.- Protocols.


.- Improved Private Simultaneous Messages Protocols for Symmetric
Functions with Universal Reconstruction.


.- Blockchain-based Economic Voting with Posterior Security from Lattices.


.- Privacy-Preserving Techniques.


.- Non-Interactive Privacy-Preserving Record Linkage using Polynomial
Sparsity Testing.


.- Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated
Differential Privacy.


.- Accelerating Simulations of Bitvector-Based LDP Protocols via
Binomial Modeling.


.- AI Attacks and Mitigations.


.- Supply Chain Threats in the MCP Ecosystem: Attack Vectors and
Mitigation Strategies.


.- Evaluation of Adversarial Input Attacks in Retrieval-Augmented
Generation Using Large Language Models.


.- Vulnerability Detection.


.- Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using
Metadata.


.- Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code
Analysis.


.- Cache & Code-Execution: Attacks and Mitigations.


.- Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks
by Monitoring Ping-Pong Accesses Patterns.


.- Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped
RISC-V Processor.


.- Cyber Attack & Threat Analysis.



.- Benign Activity Extraction for Dependency Reduction in Data
Provenance-based Attack Analysis.


.- Cyber Threat Intelligence Report Summarization with Named Entity
Recognition. 


.- Wireless Communication Security.


.- One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4
BPSK.


.- Human Factors in Cyber Security.


.- Nudges to Reduce the Spread of Online Disinformation: A Comparison
with the Educational Effect.


.- Sequence Length Aggregation and Behavioral Biometrics: A Case
Study in Professional Player Authentication via Tree-Based Classification.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo 69 Illustrations, color; 27 Illustrations, black and white
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte applied cryptography • blockchain and cryptocurrency • cryptographic primitives • cryptographic protocols • Cyberattacks and defenses • Cyber Physical Systems • Formal methods for security analysis • hardware security • Human-computer interaction, security, and privacy • Internet-of-Things security • Intrusion Detection and Prevention • Machine Learning and AI Security • malware analysis • Mobile and web security • Offensive Security • post-quantum cryptography • Privacy-Enhancing Technologies • Public-Key Cryptography • Software Security • Symmetric-Key Cryptography
ISBN-10 981-95-4673-7 / 9819546737
ISBN-13 978-981-95-4673-2 / 9789819546732
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95