Advances in Information and Computer Security
20th International Workshop on Security, IWSEC 2025, Fukuoka, Japan, November 25-27, 2025, Proceedings
Herausgegeben:Cid, Carlos; Yanai, Naoto
Advances in Information and Computer Security
20th International Workshop on Security, IWSEC 2025, Fukuoka, Japan, November 25-27, 2025, Proceedings
Herausgegeben:Cid, Carlos; Yanai, Naoto
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2025, held in Fukuoka, Japan, in November 25, 2025.
The 27 full papers were carefully reviewed and selected from 95 submissions. These papers were categorized into the following sections: Public-Key Encryption; Signature Schemes; Security and Analysis of Post-Quantum Cryptography; Card-Based Cryptography; Protocols; Privacy-Preserving Techniques; AI Attacks and Mitigations; Vulnerability Detection; Cache & Code-Execution: Attacks and Mitigations; Cyber…mehr
Andere Kunden interessierten sich auch für
Advances in Information and Computer Security44,99 €
Advances in Information and Computer Security49,99 €
Advances in Cryptology - Asiacrypt 202576,99 €
Advances in Cryptology - Asiacrypt 202574,99 €
Advances in Cryptology - Asiacrypt 202574,99 €
Advances in Cryptology - Asiacrypt 202574,99 €
Jordan SchroederAdvanced Persistent Training42,99 €-
-
-
This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2025, held in Fukuoka, Japan, in November 25, 2025.
The 27 full papers were carefully reviewed and selected from 95 submissions. These papers were categorized into the following sections: Public-Key Encryption; Signature Schemes; Security and Analysis of Post-Quantum Cryptography; Card-Based Cryptography; Protocols; Privacy-Preserving Techniques; AI Attacks and Mitigations; Vulnerability Detection; Cache & Code-Execution: Attacks and Mitigations; Cyber Attack & Threat Analysis; Wireless Communication Security and Human Factors in Cyber Security.
The 27 full papers were carefully reviewed and selected from 95 submissions. These papers were categorized into the following sections: Public-Key Encryption; Signature Schemes; Security and Analysis of Post-Quantum Cryptography; Card-Based Cryptography; Protocols; Privacy-Preserving Techniques; AI Attacks and Mitigations; Vulnerability Detection; Cache & Code-Execution: Attacks and Mitigations; Cyber Attack & Threat Analysis; Wireless Communication Security and Human Factors in Cyber Security.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 16208
- Verlag: Springer, Berlin; Springer
- Artikelnr. des Verlages: 89557771
- Seitenzahl: 568
- Erscheinungstermin: 25. November 2025
- Englisch
- Abmessung: 235mm x 155mm x 31mm
- Gewicht: 850g
- ISBN-13: 9789819546732
- ISBN-10: 9819546737
- Artikelnr.: 75643562
- Herstellerkennzeichnung
- Springer-Verlag KG
- Sachsenplatz 4-6
- 1201 Wien, AT
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 16208
- Verlag: Springer, Berlin; Springer
- Artikelnr. des Verlages: 89557771
- Seitenzahl: 568
- Erscheinungstermin: 25. November 2025
- Englisch
- Abmessung: 235mm x 155mm x 31mm
- Gewicht: 850g
- ISBN-13: 9789819546732
- ISBN-10: 9819546737
- Artikelnr.: 75643562
- Herstellerkennzeichnung
- Springer-Verlag KG
- Sachsenplatz 4-6
- 1201 Wien, AT
- ProductSafety@springernature.com
.
Public
Key Encryption. .
Dynamic Collusion Function
Private Functional Encryption. .
Public Key Encryption with Equality Test from Tag
Based Encryption. .
Approximate CRT
Based Gadget Decomposition for Fully Homomorphic Encryption. .
Signature Schemes. .
Ordered Multi
Signatures with Public
Key Aggregation from SXDH Assumption. .
Multi
Designated Verifier Ring Signature: Generic Construction from Standard Primitives. .
Security and Analysis of Post
Quantum Cryptography. .
An Extended Rectangular MinRank Attack against UOV and Its Variants. .
Refined Analysis of the Concrete Hardness of the Quasi
Cyclic Syndrome Decoding. .
Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?. .
Cryptanalysis of the best HFE
LL’ Constructions. .
Card
Based Cryptography. .
Efficient Card
Based Protocols for Symmetric and Partially Doubly Symmetric Functions. .
Minimum number of up
down cards for finite
time committed
AND protocol without interlocking operations. .
Protocols. .
Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction. .
Blockchain
based Economic Voting with Posterior Security from Lattices. .
Privacy
Preserving Techniques. .
Non
Interactive Privacy
Preserving Record Linkage using Polynomial Sparsity Testing. .
Utility of the Non
Negative Wavelet Mechanism with Zero
Concentrated Differential Privacy. .
Accelerating Simulations of Bitvector
Based LDP Protocols via Binomial Modeling. .
AI Attacks and Mitigations. .
Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies. .
Evaluation of Adversarial Input Attacks in Retrieval
Augmented Generation Using Large Language Models. .
Vulnerability Detection. .
Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata. .
Detecting Fake Proof
of
Concept Codes on GitHub Using Static Code Analysis. .
Cache & Code
Execution: Attacks and Mitigations. .
Detecting and Mitigating Conflict
Based Cache Side
Channel Attacks by Monitoring Ping
Pong Accesses Patterns. .
Analyzing and Mitigating the SSB Vulnerability in an MDP
Equipped RISC
V Processor. .
Cyber Attack & Threat Analysis. .
Benign Activity Extraction for Dependency Reduction in Data Provenance
based Attack Analysis. .
Cyber Threat Intelligence Report Summarization with Named Entity Recognition. .
Wireless Communication Security. .
One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK. .
Human Factors in Cyber Security. .
Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect. .
Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree
Based Classification.
Public
Key Encryption. .
Dynamic Collusion Function
Private Functional Encryption. .
Public Key Encryption with Equality Test from Tag
Based Encryption. .
Approximate CRT
Based Gadget Decomposition for Fully Homomorphic Encryption. .
Signature Schemes. .
Ordered Multi
Signatures with Public
Key Aggregation from SXDH Assumption. .
Multi
Designated Verifier Ring Signature: Generic Construction from Standard Primitives. .
Security and Analysis of Post
Quantum Cryptography. .
An Extended Rectangular MinRank Attack against UOV and Its Variants. .
Refined Analysis of the Concrete Hardness of the Quasi
Cyclic Syndrome Decoding. .
Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?. .
Cryptanalysis of the best HFE
LL’ Constructions. .
Card
Based Cryptography. .
Efficient Card
Based Protocols for Symmetric and Partially Doubly Symmetric Functions. .
Minimum number of up
down cards for finite
time committed
AND protocol without interlocking operations. .
Protocols. .
Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction. .
Blockchain
based Economic Voting with Posterior Security from Lattices. .
Privacy
Preserving Techniques. .
Non
Interactive Privacy
Preserving Record Linkage using Polynomial Sparsity Testing. .
Utility of the Non
Negative Wavelet Mechanism with Zero
Concentrated Differential Privacy. .
Accelerating Simulations of Bitvector
Based LDP Protocols via Binomial Modeling. .
AI Attacks and Mitigations. .
Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies. .
Evaluation of Adversarial Input Attacks in Retrieval
Augmented Generation Using Large Language Models. .
Vulnerability Detection. .
Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata. .
Detecting Fake Proof
of
Concept Codes on GitHub Using Static Code Analysis. .
Cache & Code
Execution: Attacks and Mitigations. .
Detecting and Mitigating Conflict
Based Cache Side
Channel Attacks by Monitoring Ping
Pong Accesses Patterns. .
Analyzing and Mitigating the SSB Vulnerability in an MDP
Equipped RISC
V Processor. .
Cyber Attack & Threat Analysis. .
Benign Activity Extraction for Dependency Reduction in Data Provenance
based Attack Analysis. .
Cyber Threat Intelligence Report Summarization with Named Entity Recognition. .
Wireless Communication Security. .
One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK. .
Human Factors in Cyber Security. .
Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect. .
Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree
Based Classification.
.
Public
Key Encryption. .
Dynamic Collusion Function
Private Functional Encryption. .
Public Key Encryption with Equality Test from Tag
Based Encryption. .
Approximate CRT
Based Gadget Decomposition for Fully Homomorphic Encryption. .
Signature Schemes. .
Ordered Multi
Signatures with Public
Key Aggregation from SXDH Assumption. .
Multi
Designated Verifier Ring Signature: Generic Construction from Standard Primitives. .
Security and Analysis of Post
Quantum Cryptography. .
An Extended Rectangular MinRank Attack against UOV and Its Variants. .
Refined Analysis of the Concrete Hardness of the Quasi
Cyclic Syndrome Decoding. .
Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?. .
Cryptanalysis of the best HFE
LL’ Constructions. .
Card
Based Cryptography. .
Efficient Card
Based Protocols for Symmetric and Partially Doubly Symmetric Functions. .
Minimum number of up
down cards for finite
time committed
AND protocol without interlocking operations. .
Protocols. .
Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction. .
Blockchain
based Economic Voting with Posterior Security from Lattices. .
Privacy
Preserving Techniques. .
Non
Interactive Privacy
Preserving Record Linkage using Polynomial Sparsity Testing. .
Utility of the Non
Negative Wavelet Mechanism with Zero
Concentrated Differential Privacy. .
Accelerating Simulations of Bitvector
Based LDP Protocols via Binomial Modeling. .
AI Attacks and Mitigations. .
Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies. .
Evaluation of Adversarial Input Attacks in Retrieval
Augmented Generation Using Large Language Models. .
Vulnerability Detection. .
Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata. .
Detecting Fake Proof
of
Concept Codes on GitHub Using Static Code Analysis. .
Cache & Code
Execution: Attacks and Mitigations. .
Detecting and Mitigating Conflict
Based Cache Side
Channel Attacks by Monitoring Ping
Pong Accesses Patterns. .
Analyzing and Mitigating the SSB Vulnerability in an MDP
Equipped RISC
V Processor. .
Cyber Attack & Threat Analysis. .
Benign Activity Extraction for Dependency Reduction in Data Provenance
based Attack Analysis. .
Cyber Threat Intelligence Report Summarization with Named Entity Recognition. .
Wireless Communication Security. .
One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK. .
Human Factors in Cyber Security. .
Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect. .
Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree
Based Classification.
Public
Key Encryption. .
Dynamic Collusion Function
Private Functional Encryption. .
Public Key Encryption with Equality Test from Tag
Based Encryption. .
Approximate CRT
Based Gadget Decomposition for Fully Homomorphic Encryption. .
Signature Schemes. .
Ordered Multi
Signatures with Public
Key Aggregation from SXDH Assumption. .
Multi
Designated Verifier Ring Signature: Generic Construction from Standard Primitives. .
Security and Analysis of Post
Quantum Cryptography. .
An Extended Rectangular MinRank Attack against UOV and Its Variants. .
Refined Analysis of the Concrete Hardness of the Quasi
Cyclic Syndrome Decoding. .
Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?. .
Cryptanalysis of the best HFE
LL’ Constructions. .
Card
Based Cryptography. .
Efficient Card
Based Protocols for Symmetric and Partially Doubly Symmetric Functions. .
Minimum number of up
down cards for finite
time committed
AND protocol without interlocking operations. .
Protocols. .
Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction. .
Blockchain
based Economic Voting with Posterior Security from Lattices. .
Privacy
Preserving Techniques. .
Non
Interactive Privacy
Preserving Record Linkage using Polynomial Sparsity Testing. .
Utility of the Non
Negative Wavelet Mechanism with Zero
Concentrated Differential Privacy. .
Accelerating Simulations of Bitvector
Based LDP Protocols via Binomial Modeling. .
AI Attacks and Mitigations. .
Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies. .
Evaluation of Adversarial Input Attacks in Retrieval
Augmented Generation Using Large Language Models. .
Vulnerability Detection. .
Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata. .
Detecting Fake Proof
of
Concept Codes on GitHub Using Static Code Analysis. .
Cache & Code
Execution: Attacks and Mitigations. .
Detecting and Mitigating Conflict
Based Cache Side
Channel Attacks by Monitoring Ping
Pong Accesses Patterns. .
Analyzing and Mitigating the SSB Vulnerability in an MDP
Equipped RISC
V Processor. .
Cyber Attack & Threat Analysis. .
Benign Activity Extraction for Dependency Reduction in Data Provenance
based Attack Analysis. .
Cyber Threat Intelligence Report Summarization with Named Entity Recognition. .
Wireless Communication Security. .
One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK. .
Human Factors in Cyber Security. .
Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect. .
Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree
Based Classification.







