Innovative Security Solutions for Information Technology and Communications
Innovative Security Solutions for Information Technology and Communications
18th International Conference, SecITC 2025, Bucharest, Romania, November 20-21, 2025, Revised Selected Papers
Zamfiroiu, Alin; D'Arco, Paolo
Springer Nature Switzerland AG
04/2026
330
Mole
Inglês
9783032174420
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Adding Two Easy Functions Is Always Hard to Invert.
.- Adaptively Secure Matchmaking Encryption from Witness Encryption.
.- Deniable Asymmetric One-Round Group Key Agreement.
.- Effciency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction.
.- Card-based Representation of Floating-point Numbers and Arithmetic Operations.
.- Suken BINGO: An Application of Card-based Cryptography to Psychological Board Games.
.- Post-quantum Cryptography.
.- Q-PROTECT: Towards Quantum-Safe Cryptography in 5G Networks.
.- DILISAES: An Experimental Lattice-Based Post-Quantum Signcryption Scheme.
.- Hard-to-Find Bugs in a Post-Quantum Age.
.- Combining digital signatures and key recycling in QKD authentication: a performance and security analysis.
.- Artificial Intelligence Techniques for Security.
.- Hybrid Deep Learning and QNN for detecting attacks within IoT Networks.
.- Evaluating the E cacy of Large Language Models for Automated Vulnerable Code Generation.
.- Securing LLM-Integrated Chatbots: A Transformer-Based Vulnerability Scanner for Prompt Injection and Jailbreak Detection.
.- Machine Learning-Based Web Application Firewalls for SQL Injection and XSS Prevention.
.- Application, System and Network Security.
.- Proposal and evaluation of a method for Container Micro-Segmentation.
.- Supervised Attack Trees.
.- Applying SOA Principles to Next-Generation Cyber Range Design.
.- Enhancing Keycloak with Veri able Audit Trails for Identity and Access Management - A Merkle Tree Approach.
.- Rust in the Kernel: A Practical Evaluation on Windows.
.- Hierarchical Hashing for End-to-End Integrity in HTTP Live Streaming (HLS).
.- Adding Two Easy Functions Is Always Hard to Invert.
.- Adaptively Secure Matchmaking Encryption from Witness Encryption.
.- Deniable Asymmetric One-Round Group Key Agreement.
.- Effciency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction.
.- Card-based Representation of Floating-point Numbers and Arithmetic Operations.
.- Suken BINGO: An Application of Card-based Cryptography to Psychological Board Games.
.- Post-quantum Cryptography.
.- Q-PROTECT: Towards Quantum-Safe Cryptography in 5G Networks.
.- DILISAES: An Experimental Lattice-Based Post-Quantum Signcryption Scheme.
.- Hard-to-Find Bugs in a Post-Quantum Age.
.- Combining digital signatures and key recycling in QKD authentication: a performance and security analysis.
.- Artificial Intelligence Techniques for Security.
.- Hybrid Deep Learning and QNN for detecting attacks within IoT Networks.
.- Evaluating the E cacy of Large Language Models for Automated Vulnerable Code Generation.
.- Securing LLM-Integrated Chatbots: A Transformer-Based Vulnerability Scanner for Prompt Injection and Jailbreak Detection.
.- Machine Learning-Based Web Application Firewalls for SQL Injection and XSS Prevention.
.- Application, System and Network Security.
.- Proposal and evaluation of a method for Container Micro-Segmentation.
.- Supervised Attack Trees.
.- Applying SOA Principles to Next-Generation Cyber Range Design.
.- Enhancing Keycloak with Veri able Audit Trails for Identity and Access Management - A Merkle Tree Approach.
.- Rust in the Kernel: A Practical Evaluation on Windows.
.- Hierarchical Hashing for End-to-End Integrity in HTTP Live Streaming (HLS).