Secure IT Systems : 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings (Lecture Notes in Computer Science 16325) (2026. x, 570 S. X, 570 p. 235 mm)

個数:
  • 予約
  • ポイントキャンペーン

Secure IT Systems : 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings (Lecture Notes in Computer Science 16325) (2026. x, 570 S. X, 570 p. 235 mm)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • ≪洋書のご注文について≫ 「海外取次在庫あり」「国内在庫僅少」および「国内仕入れ先からお取り寄せいたします」表示の商品でもクリスマス前(12/20~12/25)および年末年始までにお届けできないことがございます。あらかじめご了承ください。

  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032147813

Full Description

This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.

The 29 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Cryptography; Artificial Intelligence and Software Security; Network and Communication Security; System and Hardware Security; Threat Analysis; Access Control and Policy Management; Usable Security and Societal Resilience; and Obfuscation.

Contents

.- Cryptography.

.- DDH-Based Schemes for Multi-Party Function Secret Sharing.

.- Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility.

.- Attacking an RSA-like Cryptosystem Using Continued Fractions and Lattices.

.- A Comparative Software Benchmark of Lightweight Hash Functions on 8-bit AVR Using ChipWhisperer.

.- A New Optimized Implementation of SMAUG-T for Lightweight Devices.

.- Exploiting Quantum Point-to-Point Protocol (Q3P) for Denial-of- Service (DoS) Attacks.

.- Artificial Intelligence and Software Security.

.- OHRA: Dynamic Multi-Protocol LLM-Based Cyber Deception.

.- Targeted AI-Based Password Guessing Leveraging Email-Derived User Attributes.

.- On the Security and Privacy of AI-based Mobile Health Chatbots.

.- Fairness Under Noise: How Di!erential Privacy A!ects Bias in GANs-Generated Data.

.- GadgetBuilder: An Overhaul of the Greatest Java Deserialization Exploitation Tool.

.- Software Supply Chain Security: Can We Beat the Kill-Chain? A Case Study on the XZ Backdoor.

.- Network and Communication Security.

.- MP-LFM: Breaking Subscriber Privacy (even more) by Exploiting Linkability in 5G AKA.

.- Mitigating Tra"c Analysis Attacks While Maintaining On-Path Network Observability.

.- Privacy and Security of DNS Resolvers used in the Nordics and Baltics.

.- System and Hardware Security.

.- WireTrust: A TrustZone-Based Non-Bypassable VPN Tunnel.

.- Timing Interference in Multi-Core RISC-V Systems: Security Risks and Mitigations.

.- A Walk Down Memory Lane: Timing Analysis of Load and Store Instructions on ARM Cortex-M3 Devices.

.- Threat Analysis.

.- An Empirical Evaluation of Intrusion Detection Systems Based on System Calls.

.- Dissecting Mirai: Spatio-Sequential Analysis and Restoration Strategies Using MITRE ATT&CK and D3FEND.

.- Graph Reduction to Attack Trees for (Unobservable) Target Analysis.

.- Access Control and Policy Management.

.- Threshold Trust Logic.

.- Mining Attribute-Based Access Control Policies via Categorisation.

.- Multi-entity Control-Based Risk Assessment: A European Digital Identity Wallet Use Case.

.- Usable Security and Societal Resilience.

.- From Perception to Protection: A Mental Model-Based Framework for Capturing Usable Security and Privacy Requirements.

.- Understanding APT Defense Through Expert Eyes: A Critical Exploration of Perceived Needs and Gaps.

.- Foreign Disinformation on Swedish Facebook: A Mixed-Methods Thematic Analysis of Manipulative Narratives and Societal Resilience.

.- Obfuscation.

.- Key-Gated Generative Obfuscation for Embedded Strings.

.- Bugfuscation.

最近チェックした商品