Innovative Security Solutions for Information Technology and Communications : 18th International Conference, SecITC 2025, Bucharest, Romania, November 20-21, 2025, Revised Selected Papers (Lecture Notes in Computer Science 16443) (2026. x, 345 S. X, 345 p. 235 mm)

個数:
  • 予約

Innovative Security Solutions for Information Technology and Communications : 18th International Conference, SecITC 2025, Bucharest, Romania, November 20-21, 2025, Revised Selected Papers (Lecture Notes in Computer Science 16443) (2026. x, 345 S. X, 345 p. 235 mm)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032174420

Full Description

This book constitutes the revised selected papers of the 18th International Conference, SecITC 2025, held in Bucharest, Romania, during November 20-21, 2025.

The 20 full papers included in this volume were carefully reviewed and selected from 44 submissions. They are organized in the following topical sections: Cryptographic Primitives and Protocols; Post-quantum Cryptography; Artificial Intelligence Techniques for Security; Application, System and Network Security.

Contents

.- Cryptographic Primitives and Protocols.

.- Adding Two Easy Functions Is Always Hard to Invert.

.- Adaptively Secure Matchmaking Encryption from Witness Encryption.

.- Deniable Asymmetric One-Round Group Key Agreement.

.- Effciency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction.

.- Card-based Representation of Floating-point Numbers and Arithmetic Operations.

.- Suken BINGO: An Application of Card-based Cryptography to Psychological Board Games.

.- Post-quantum Cryptography.

.- Q-PROTECT: Towards Quantum-Safe Cryptography in 5G Networks.

.- DILISAES: An Experimental Lattice-Based Post-Quantum Signcryption Scheme.

.- Hard-to-Find Bugs in a Post-Quantum Age.

.- Combining digital signatures and key recycling in QKD authentication: a performance and security analysis.

.- Artificial Intelligence Techniques for Security.

.- Hybrid Deep Learning and QNN for detecting attacks within IoT Networks.

.- Evaluating the E cacy of Large Language Models for Automated Vulnerable Code Generation.

.- Securing LLM-Integrated Chatbots: A Transformer-Based Vulnerability Scanner for Prompt Injection and Jailbreak Detection.

.- Machine Learning-Based Web Application Firewalls for SQL Injection and XSS Prevention.

.- Application, System and Network Security.

.- Proposal and evaluation of a method for Container Micro-Segmentation.

.- Supervised Attack Trees.

.- Applying SOA Principles to Next-Generation Cyber Range Design.

.- Enhancing Keycloak with Veri able Audit Trails for Identity and Access Management - A Merkle Tree Approach.

.- Rust in the Kernel: A Practical Evaluation on Windows.

.- Hierarchical Hashing for End-to-End Integrity in HTTP Live Streaming (HLS).

最近チェックした商品