


default search action
SEC 2025: Maribor, Slovenia
- Lili Nemec Zlatolas

, Kai Rannenberg, Tatjana Welzer
, Joaquín García-Alfaro
:
ICT Systems Security and Privacy Protection - 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part II. IFIP Advances in Information and Communication Technology 746, Springer 2025, ISBN 978-3-031-92885-7
Applied Cryptography
- Jiri Gavenda

, Marek Sýs
:
CoolTest: Improved Randomness Testing Using Boolean Functions. 3-17 - Maximilian Wittig

, Dogan Kesdogan:
Towards a Lightweight and Privacy-Friendly Architecture for Online Advertising. 18-33 - Dmytro Shvets

, Edona Fasllija
, Jakob Heher, Stefan More
:
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats. 34-48 - Henrich C. Pöhls

, Lukas Steffens:
Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices. 49-63
Data and Application Security
- Shiva Houshmand

, Smita Ghosh
, Jared Maeyama:
Generating and Attacking Passwords with Misspellings by Leveraging Homophones. 67-81 - Zoltán Ádám Mann:

Time is Money: A Temporal Model of Cybersecurity. 82-96 - Ahmad B. Usman

, Mikael Asplund
:
Update at Your Own Risk: Analysis and Recommendations for Update-Related Vulnerabilities. 97-110 - Andreas Schaad, Stefan Götz, Dominik Binder:

You Still have to Study On the Security of LLM Generated Code. 111-124 - Pierre-François Gimenez, Sarath Sivaprasad, Mario Fritz:

Certifiably Robust Malware Detectors by Design. 125-139 - Francesco Panebianco

, Mario D'Onghia
, Stefano Zanero
, Michele Carminati
:
How Stealthy is Stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World. 140-154 - Sunny Chowdhury

, Florian Freund
:
Identifying and Analyzing Vulnerabilities and Exploits in On-Premises Kubernetes. 155-169
International Workshop on Network and Distributed Systems Security (WNDSS 2025)
- Can Özkan, Dave Singelée

:
A Novel Evidence-Based Threat Enumeration Methodology for ICS. 175-188 - Christoph Sendner

, Dominik Schreider, Alexandra Dmitrienko
:
Impact Analysis of Sybil Attacks in the Tor Network. 189-204 - Moritz Volkmann

, Sascha Kaven
, Volker Skwarek
:
Security Metrics for False Data Injection in Smart Grids. 205-218 - Fiona Fuchs

, Felix Walter
, Florian Tschorsch:
BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs. 219-233 - Iain Burge, Michel Barbeau

, Joaquín García-Alfaro
:
A Quantum Algorithm for Assessing Node Importance in the st-Connectivity Attack. 234-248 - August See, Benedikt Ostendorf, Lilly Sell, Mathias Fischer:

Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. 249-262 - Moritz Finke, Alexandra Dmitrienko:

Time-Aware Face Anti-spoofing with Rotation Invariant Local Binary Patterns and Deep Learning. 263-277

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














