Advances in Information and Computer Security : 20th International Workshop on Security, IWSEC 2025, Fukuoka, Japan, November 25, 2025, Proceedings (Lecture Notes in Computer Science)

個数:
  • 予約

Advances in Information and Computer Security : 20th International Workshop on Security, IWSEC 2025, Fukuoka, Japan, November 25, 2025, Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 499 p.
  • 言語 ENG
  • 商品コード 9789819546732

Full Description

This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2025, held in Fukuoka, Japan, in November 25, 2025.

The 27 full papers were carefully reviewed and selected from 95 submissions. These papers were categorized into the following sections: Public-Key Encryption; Signature Schemes; Security and Analysis of Post-Quantum Cryptography; Card-Based Cryptography; Protocols; Privacy-Preserving Techniques; AI Attacks and Mitigations; Vulnerability Detection; Cache & Code-Execution: Attacks and Mitigations; Cyber Attack & Threat Analysis; Wireless Communication Security and Human Factors in Cyber Security.

Contents

.- Public-Key Encryption.

.- Dynamic Collusion Function-Private Functional Encryption.

.- Public Key Encryption with Equality Test from Tag-Based Encryption.

.-  Approximate CRT-Based Gadget Decomposition for Fully
Homomorphic Encryption.

.- Signature Schemes.

.- Ordered Multi-Signatures with Public-Key Aggregation from SXDH
Assumption.

.- Multi-Designated Verifier Ring Signature: Generic Construction from
Standard Primitives.

.- Security and Analysis of Post-Quantum Cryptography.

.- An Extended Rectangular MinRank Attack against UOV and Its Variants.

.- Refined Analysis of the Concrete Hardness of the Quasi-Cyclic
Syndrome Decoding.

.- Practical Lattice Attack and Patched Parameters for 2F Multivariate
Encryption: Is 2F Still Better Than Standard Lattice Constructions for
Small Ciphertext Size?.

.- Cryptanalysis of the best HFE-LL' Constructions.

.- Card-Based Cryptography.

.- Efficient Card-Based Protocols for Symmetric and Partially Doubly
Symmetric Functions.

.- Minimum number of up-down cards for finite-time committed-AND
protocol without interlocking operations. 

.- Protocols.

.- Improved Private Simultaneous Messages Protocols for Symmetric
Functions with Universal Reconstruction.

.- Blockchain-based Economic Voting with Posterior Security from Lattices.

.- Privacy-Preserving Techniques.

.- Non-Interactive Privacy-Preserving Record Linkage using Polynomial
Sparsity Testing.

.- Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated
Differential Privacy.

.- Accelerating Simulations of Bitvector-Based LDP Protocols via
Binomial Modeling.

.- AI Attacks and Mitigations.

.- Supply Chain Threats in the MCP Ecosystem: Attack Vectors and
Mitigation Strategies.

.- Evaluation of Adversarial Input Attacks in Retrieval-Augmented
Generation Using Large Language Models.

.- Vulnerability Detection.

.- Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using
Metadata.

.- Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code
Analysis.

.- Cache & Code-Execution: Attacks and Mitigations.

.- Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks
by Monitoring Ping-Pong Accesses Patterns.

.- Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped
RISC-V Processor.

.- Cyber Attack & Threat Analysis.

.- Benign Activity Extraction for Dependency Reduction in Data
Provenance-based Attack Analysis.

.- Cyber Threat Intelligence Report Summarization with Named Entity
Recognition. 

.- Wireless Communication Security.

.- One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4
BPSK.

.- Human Factors in Cyber Security.

.- Nudges to Reduce the Spread of Online Disinformation: A Comparison
with the Educational Effect.

.- Sequence Length Aggregation and Behavioral Biometrics: A Case
Study in Professional Player Authentication via Tree-Based Classification.

最近チェックした商品