ICT Systems Security and Privacy Protection: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II

Author:   Lili Nemec Zlatolas ,  Kai Rannenberg ,  Tatjana Welzer ,  Joaquin Garcia-Alfaro
Publisher:   Springer International Publishing AG
Volume:   746
ISBN:  

9783031928857


Pages:   280
Publication Date:   16 May 2025
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $258.72 Quantity:  
Add to Cart

Share |

ICT Systems Security and Privacy Protection: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II


Overview

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025.  The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

Full Product Details

Author:   Lili Nemec Zlatolas ,  Kai Rannenberg ,  Tatjana Welzer ,  Joaquin Garcia-Alfaro
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   746
ISBN:  

9783031928857


ISBN 10:   3031928857
Pages:   280
Publication Date:   16 May 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.
Language:   English

Table of Contents

.- Applied Cryptography. .- CoolTest: Improved Randomness Testing Using Boolean Functions. .- Towards a lightweight and privacy friendly Architecture for Online Advertising. .- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. .- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. .- Data and Application Security. .- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. .- Time is money: A temporal model of cybersecurity. .- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. .- ”You still have to study” On the Security of LLM generated code. .- Certifiably robust malware detectors by design. .- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. .- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. .- International Workshop on Network and Distributed Systems Security (WNDSS 2025). .- A Novel Evidence-Based Threat Enumeration Methodology for ICS. .- Impact Analysis of Sybil Attacks in the Tor Network. .- Security Metrics for False Data Injection in Smart Grids. .- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. .- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. .- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. .- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List