


default search action
23rd ACNS 2025: Munich, Germany - Workshops Part III
- Mark Manulis

:
Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23-26, 2025, Revised Selected Papers, Part III. Lecture Notes in Computer Science 15655, Springer 2026, ISBN 978-3-032-01822-9
SiMLA - Security in Machine Learning and Its Applications
- Inoussa Mouiche

, Sherif Saad
:
TIRE: Advancing Threat Intelligence Relation Extraction with a Novel Data-Centric Framework. 3-22 - Sanjana Nambiar, Christina Pöpper

:
JailFact-Bench: A Comprehensive Analysis of Jailbreak Attacks vs. Hallucinations in LLMs. 23-42 - Felix Maurer

, Jonas Sander
, Thomas Eisenbarth
:
ReDASH: Fast and Efficient Scaling in Arithmetic Garbled Circuits for Secure Outsourced Inference. 43-51 - Lars Malmqvist:

Winning at All Cost: A Small Environment for Eliciting Specification Gaming Behaviors in Large Language Models. 52-69 - Elnaz Rabieinejad, Ali Dehghantanha, Fattane Zarrinkalam, Jeff Schwartzentruber:

United We Log, Divided We Identify: A Decentralized Approach for Automated Log Analysis. 70-88 - Rina Mishra

, Gaurav Varshney:
A Study of Effectiveness of Brand Domain Identification Features for Phishing Detection in 2025. 89-108 - Bram van Dartel, Marc Damie, Florian Hahn:

Evaluating Membership Inference Attacks in Heterogeneous-Data Setups. 109-117
CIMSS - Critical Infrastructure and Manufacturing System Security
- Awais Yousaf

, Lee Ling Yi Kalvin, Meixuan Li
, Jianying Zhou
:
Spying by SPi, I Got the Birds-Eye. 121-140 - Laurens Le Jeune

, Anna Hristoskova
, Seyed Farhad Aghili
:
Fast and Robust Fragile Watermarking Enabling Real-Time Self-recovery for UAS. 141-161 - Hendrik Meyer zum Felde

, Radhouene Azzabi
, Cédric Gouy-Pailler
, Gilles Lehmann
, Amaia Gil
:
Standardized and Usage-Controlled Alert Analysis for Improved Cyber Threat Intelligence. 162-176
Poster Papers
- Caleb Lee Jia Jing, He Haiqi, Vivek Balachandran:

HatMob: An All-Encompassing Mobile Pentesting Suite. 179-184 - Sergejs Kozlovics

, Krisjanis Petrucena, Juris Viksna
:
An Information-Theoretically Secure QKD Protocol for One-Time Pad Encryption. 185-190 - Mirko Goldmann, Leonardo Del Bino, Michael Kissner:

A Path Towards All-Optical DDoS Detection on Encrypted Network Traffic. 191-196 - Amal Raj, Vivek Balachandran

:
A Hybrid Encryption Framework Combining Classical, Post-Quantum, and QKD Methods. 197-201 - Kenneth Odoh

:
POSTER: Tortoise: An Authenticated Encryption Scheme. 202-206 - Akshit Aggarwal, Yang Li, Srinibas Swain:

Optimized Noise Bound in BFV Homomorphic Encryption. 207-212 - Akshit Aggarwal, Yang Li, Srinibas Swain:

Private LGBTQ Searches Without a Trace. 213-217 - Meret Kristen

, Jürgen Mottok:
Security Proof Techniques for QKD and Applications to Critical Infrastructures. 218-222 - Kenshiro Ise, Yuko Hara

:
Privacy and Latency-Aware Dynamic Split Computing. 223-228

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














