Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications portes grátis

Innovative Security Solutions for Information Technology and Communications

18th International Conference, SecITC 2025, Bucharest, Romania, November 20-21, 2025, Revised Selected Papers

Zamfiroiu, Alin; D'Arco, Paolo

Springer Nature Switzerland AG

04/2026

330

Mole

Inglês

9783032174420

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Cryptographic Primitives and Protocols.


.- Adding Two Easy Functions Is Always Hard to Invert.


.- Adaptively Secure Matchmaking Encryption from Witness Encryption.


.- Deniable Asymmetric One-Round Group Key Agreement.


.- Effciency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction.


.- Card-based Representation of Floating-point Numbers and Arithmetic Operations.


.- Suken BINGO: An Application of Card-based Cryptography to Psychological Board Games.


.- Post-quantum Cryptography.


.- Q-PROTECT: Towards Quantum-Safe Cryptography in 5G Networks.


.- DILISAES: An Experimental Lattice-Based Post-Quantum Signcryption Scheme.


.- Hard-to-Find Bugs in a Post-Quantum Age.


.- Combining digital signatures and key recycling in QKD authentication: a performance and security analysis.


.- Artificial Intelligence Techniques for Security.


.- Hybrid Deep Learning and QNN for detecting attacks within IoT Networks.


.- Evaluating the E cacy of Large Language Models for Automated Vulnerable Code Generation.


.- Securing LLM-Integrated Chatbots: A Transformer-Based Vulnerability Scanner for Prompt Injection and Jailbreak Detection.


.- Machine Learning-Based Web Application Firewalls for SQL Injection and XSS Prevention.


.- Application, System and Network Security.


.- Proposal and evaluation of a method for Container Micro-Segmentation.


.- Supervised Attack Trees.


.- Applying SOA Principles to Next-Generation Cyber Range Design.


.- Enhancing Keycloak with Veri able Audit Trails for Identity and Access Management - A Merkle Tree Approach.


.- Rust in the Kernel: A Practical Evaluation on Windows.


.- Hierarchical Hashing for End-to-End Integrity in HTTP Live Streaming (HLS).
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cryptographic primitives and protocols;key management;mathematical foundations;public-key techniques;symmetric techniques and hash functions; post-quantum primitives;AI-based techniques for security;software and application security;system security;network security