My Account Log in

1 option

Advances in Information and Computer Security : 20th International Workshop on Security, IWSEC 2025, Fukuoka, Japan, November 25–27, 2025, Proceedings / edited by Carlos Cid, Naoto Yanai.

Springer Nature - Springer Computer Science eBooks 2026 English International Available online

View online
Format:
Book
Author/Creator:
Cid, Carlos.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 16208
Language:
English
Subjects (All):
Data protection.
Application software.
Computers.
Computer networks.
Data and Information Security.
Computer and Information Systems Applications.
Computing Milieux.
Computer Communication Networks.
Local Subjects:
Data and Information Security.
Computer and Information Systems Applications.
Computing Milieux.
Computer Communication Networks.
Physical Description:
1 online resource (919 pages)
Edition:
1st ed. 2026.
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2026.
Summary:
This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2025, held in Fukuoka, Japan, in November 25, 2025. The 27 full papers were carefully reviewed and selected from 95 submissions. These papers were categorized into the following sections: Public-Key Encryption; Signature Schemes; Security and Analysis of Post-Quantum Cryptography; Card-Based Cryptography; Protocols; Privacy-Preserving Techniques; AI Attacks and Mitigations; Vulnerability Detection; Cache & Code-Execution: Attacks and Mitigations; Cyber Attack & Threat Analysis; Wireless Communication Security and Human Factors in Cyber Security.
Contents:
Public-Key Encryption.
Dynamic Collusion Function-Private Functional Encryption.
Public Key Encryption with Equality Test from Tag-Based Encryption.
Approximate CRT-Based Gadget Decomposition for Fully Homomorphic Encryption.
Signature Schemes.
Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption.
Multi-Designated Verifier Ring Signature: Generic Construction from Standard Primitives.
Security and Analysis of Post-Quantum Cryptography.
An Extended Rectangular MinRank Attack against UOV and Its Variants.
Refined Analysis of the Concrete Hardness of the Quasi-Cyclic Syndrome Decoding.
Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?.
Cryptanalysis of the best HFE-LL’ Constructions.
Card-Based Cryptography.
Efficient Card-Based Protocols for Symmetric and Partially Doubly Symmetric Functions.
Minimum number of up-down cards for finite-time committed-AND protocol without interlocking operations.
Protocols.
Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction.
Blockchain-based Economic Voting with Posterior Security from Lattices.
Privacy-Preserving Techniques.
Non-Interactive Privacy-Preserving Record Linkage using Polynomial Sparsity Testing.
Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated Differential Privacy.
Accelerating Simulations of Bitvector-Based LDP Protocols via Binomial Modeling.
AI Attacks and Mitigations.
Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies.
Evaluation of Adversarial Input Attacks in Retrieval-Augmented Generation Using Large Language Models.
Vulnerability Detection.
Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata.
Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code Analysis.
Cache & Code-Execution: Attacks and Mitigations.
Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks by Monitoring Ping-Pong Accesses Patterns.
Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor.
Cyber Attack & Threat Analysis.
Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis.
Cyber Threat Intelligence Report Summarization with Named Entity Recognition.
Wireless Communication Security.
One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK.
Human Factors in Cyber Security.
Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect.
Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree-Based Classification.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
981-9546-74-5
9789819546749
OCLC:
1561174569

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account