Advances in Information and Computer Security
Springer Verlag, Singapore
978-981-95-4673-2 (ISBN)
- Noch nicht erschienen - erscheint am 16.12.2025
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
The 27 full papers were carefully reviewed and selected from 95 submissions. These papers were categorized into the following sections: Public-Key Encryption; Signature Schemes; Security and Analysis of Post-Quantum Cryptography; Card-Based Cryptography; Protocols; Privacy-Preserving Techniques; AI Attacks and Mitigations; Vulnerability Detection; Cache & Code-Execution: Attacks and Mitigations; Cyber Attack & Threat Analysis; Wireless Communication Security and Human Factors in Cyber Security.
.- Public-Key Encryption.
.- Dynamic Collusion Function-Private Functional Encryption.
.- Public Key Encryption with Equality Test from Tag-Based Encryption.
.- Approximate CRT-Based Gadget Decomposition for Fully
Homomorphic Encryption.
.- Signature Schemes.
.- Ordered Multi-Signatures with Public-Key Aggregation from SXDH
Assumption.
.- Multi-Designated Verifier Ring Signature: Generic Construction from
Standard Primitives.
.- Security and Analysis of Post-Quantum Cryptography.
.- An Extended Rectangular MinRank Attack against UOV and Its Variants.
.- Refined Analysis of the Concrete Hardness of the Quasi-Cyclic
Syndrome Decoding.
.- Practical Lattice Attack and Patched Parameters for 2F Multivariate
Encryption: Is 2F Still Better Than Standard Lattice Constructions for
Small Ciphertext Size?.
.- Cryptanalysis of the best HFE-LL’ Constructions.
.- Card-Based Cryptography.
.- Efficient Card-Based Protocols for Symmetric and Partially Doubly
Symmetric Functions.
.- Minimum number of up-down cards for finite-time committed-AND
protocol without interlocking operations.
.- Protocols.
.- Improved Private Simultaneous Messages Protocols for Symmetric
Functions with Universal Reconstruction.
.- Blockchain-based Economic Voting with Posterior Security from Lattices.
.- Privacy-Preserving Techniques.
.- Non-Interactive Privacy-Preserving Record Linkage using Polynomial
Sparsity Testing.
.- Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated
Differential Privacy.
.- Accelerating Simulations of Bitvector-Based LDP Protocols via
Binomial Modeling.
.- AI Attacks and Mitigations.
.- Supply Chain Threats in the MCP Ecosystem: Attack Vectors and
Mitigation Strategies.
.- Evaluation of Adversarial Input Attacks in Retrieval-Augmented
Generation Using Large Language Models.
.- Vulnerability Detection.
.- Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using
Metadata.
.- Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code
Analysis.
.- Cache & Code-Execution: Attacks and Mitigations.
.- Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks
by Monitoring Ping-Pong Accesses Patterns.
.- Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped
RISC-V Processor.
.- Cyber Attack & Threat Analysis.
.- Benign Activity Extraction for Dependency Reduction in Data
Provenance-based Attack Analysis.
.- Cyber Threat Intelligence Report Summarization with Named Entity
Recognition.
.- Wireless Communication Security.
.- One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4
BPSK.
.- Human Factors in Cyber Security.
.- Nudges to Reduce the Spread of Online Disinformation: A Comparison
with the Educational Effect.
.- Sequence Length Aggregation and Behavioral Biometrics: A Case
Study in Professional Player Authentication via Tree-Based Classification.
| Erscheinungsdatum | 25.11.2025 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | 69 Illustrations, color; 27 Illustrations, black and white |
| Verlagsort | Singapore |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | applied cryptography • blockchain and cryptocurrency • cryptographic primitives • cryptographic protocols • Cyberattacks and defenses • Cyber Physical Systems • Formal methods for security analysis • hardware security • Human-computer interaction, security, and privacy • Internet-of-Things security • Intrusion Detection and Prevention • Machine Learning and AI Security • malware analysis • Mobile and web security • Offensive Security • post-quantum cryptography • Privacy-Enhancing Technologies • Public-Key Cryptography • Software Security • Symmetric-Key Cryptography |
| ISBN-10 | 981-95-4673-7 / 9819546737 |
| ISBN-13 | 978-981-95-4673-2 / 9789819546732 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich