- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Computer & Internet
- > internet, data communication, networks
Full Description
This book constitutes the revised selected papers of the 18th International Conference, SecITC 2025, held in Bucharest, Romania, during November 20-21, 2025.
The 20 full papers included in this volume were carefully reviewed and selected from 44 submissions. They are organized in the following topical sections: Cryptographic Primitives and Protocols; Post-quantum Cryptography; Artificial Intelligence Techniques for Security; Application, System and Network Security.
Contents
.- Cryptographic Primitives and Protocols.
.- Adding Two Easy Functions Is Always Hard to Invert.
.- Adaptively Secure Matchmaking Encryption from Witness Encryption.
.- Deniable Asymmetric One-Round Group Key Agreement.
.- Effciency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction.
.- Card-based Representation of Floating-point Numbers and Arithmetic Operations.
.- Suken BINGO: An Application of Card-based Cryptography to Psychological Board Games.
.- Post-quantum Cryptography.
.- Q-PROTECT: Towards Quantum-Safe Cryptography in 5G Networks.
.- DILISAES: An Experimental Lattice-Based Post-Quantum Signcryption Scheme.
.- Hard-to-Find Bugs in a Post-Quantum Age.
.- Combining digital signatures and key recycling in QKD authentication: a performance and security analysis.
.- Artificial Intelligence Techniques for Security.
.- Hybrid Deep Learning and QNN for detecting attacks within IoT Networks.
.- Evaluating the E cacy of Large Language Models for Automated Vulnerable Code Generation.
.- Securing LLM-Integrated Chatbots: A Transformer-Based Vulnerability Scanner for Prompt Injection and Jailbreak Detection.
.- Machine Learning-Based Web Application Firewalls for SQL Injection and XSS Prevention.
.- Application, System and Network Security.
.- Proposal and evaluation of a method for Container Micro-Segmentation.
.- Supervised Attack Trees.
.- Applying SOA Principles to Next-Generation Cyber Range Design.
.- Enhancing Keycloak with Veri able Audit Trails for Identity and Access Management - A Merkle Tree Approach.
.- Rust in the Kernel: A Practical Evaluation on Windows.
.- Hierarchical Hashing for End-to-End Integrity in HTTP Live Streaming (HLS).



