Innovative Security Solutions for Information Technology and Communications: 18th International Conference, SecITC 2025, Bucharest, Romania, November 20–21, 2025, Revised Selected Papers

Author:   Paolo D'Arco ,  Alin Zamfiroiu
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032174420


Pages:   342
Publication Date:   01 May 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $129.35 Quantity:  
Pre-Order

Share |

Innovative Security Solutions for Information Technology and Communications: 18th International Conference, SecITC 2025, Bucharest, Romania, November 20–21, 2025, Revised Selected Papers


Overview

This book constitutes the revised selected papers of the 18th International Conference, SecITC 2025, held in Bucharest, Romania, during November 20–21, 2025. The 20 full papers included in this volume were carefully reviewed and selected from 44 submissions. They are organized in the following topical sections: Cryptographic Primitives and Protocols; Post-quantum Cryptography; Artificial Intelligence Techniques for Security; Application, System and Network Security.

Full Product Details

Author:   Paolo D'Arco ,  Alin Zamfiroiu
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032174420


ISBN 10:   3032174422
Pages:   342
Publication Date:   01 May 2026
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Cryptographic Primitives and Protocols. .- Adding Two Easy Functions Is Always Hard to Invert. .- Adaptively Secure Matchmaking Encryption from Witness Encryption. .- Deniable Asymmetric One-Round Group Key Agreement. .- Effciency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction. .- Card-based Representation of Floating-point Numbers and Arithmetic Operations. .- Suken BINGO: An Application of Card-based Cryptography to Psychological Board Games. .- Post-quantum Cryptography. .- Q-PROTECT: Towards Quantum-Safe Cryptography in 5G Networks. .- DILISAES: An Experimental Lattice-Based Post-Quantum Signcryption Scheme. .- Hard-to-Find Bugs in a Post-Quantum Age. .- Combining digital signatures and key recycling in QKD authentication: a performance and security analysis. .- Artificial Intelligence Techniques for Security. .- Hybrid Deep Learning and QNN for detecting attacks within IoT Networks. .- Evaluating the E cacy of Large Language Models for Automated Vulnerable Code Generation. .- Securing LLM-Integrated Chatbots: A Transformer-Based Vulnerability Scanner for Prompt Injection and Jailbreak Detection. .- Machine Learning-Based Web Application Firewalls for SQL Injection and XSS Prevention. .- Application, System and Network Security. .- Proposal and evaluation of a method for Container Micro-Segmentation. .- Supervised Attack Trees. .- Applying SOA Principles to Next-Generation Cyber Range Design. .- Enhancing Keycloak with Veri able Audit Trails for Identity and Access Management - A Merkle Tree Approach. .- Rust in the Kernel: A Practical Evaluation on Windows. .- Hierarchical Hashing for End-to-End Integrity in HTTP Live Streaming (HLS).

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

April RG 26_2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List