


default search action
SEC 2025: Maribor, Slovenia
- Lili Nemec Zlatolas
, Kai Rannenberg, Tatjana Welzer
, Joaquín García-Alfaro
:
ICT Systems Security and Privacy Protection - 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part II. IFIP Advances in Information and Communication Technology 746, Springer 2025, ISBN 978-3-031-92885-7
Applied Cryptography
- Jirí Gavenda
, Marek Sýs
:
CoolTest: Improved Randomness Testing Using Boolean Functions. 3-17 - Maximilian Wittig
, Dogan Kesdogan:
Towards a Lightweight and Privacy-Friendly Architecture for Online Advertising. 18-33 - Dmytro Shvets
, Edona Fasllija
, Jakob Heher, Stefan More
:
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats. 34-48 - Henrich C. Pöhls
, Lukas Steffens:
Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices. 49-63
Data and Application Security
- Shiva Houshmand
, Smita Ghosh
, Jared Maeyama:
Generating and Attacking Passwords with Misspellings by Leveraging Homophones. 67-81 - Zoltán Ádám Mann:
Time is Money: A Temporal Model of Cybersecurity. 82-96 - Ahmad B. Usman
, Mikael Asplund
:
Update at Your Own Risk: Analysis and Recommendations for Update-Related Vulnerabilities. 97-110 - Andreas Schaad, Stefan Götz, Dominik Binder:
You Still have to Study On the Security of LLM Generated Code. 111-124 - Pierre-François Gimenez, Sarath Sivaprasad, Mario Fritz:
Certifiably Robust Malware Detectors by Design. 125-139 - Francesco Panebianco
, Mario D'Onghia
, Stefano Zanero
, Michele Carminati
:
How Stealthy is Stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World. 140-154 - Sunny Chowdhury
, Florian Freund
:
Identifying and Analyzing Vulnerabilities and Exploits in On-Premises Kubernetes. 155-169
International Workshop on Network and Distributed Systems Security (WNDSS 2025)
- Can Özkan, Dave Singelée
:
A Novel Evidence-Based Threat Enumeration Methodology for ICS. 175-188 - Christoph Sendner
, Dominik Schreider, Alexandra Dmitrienko
:
Impact Analysis of Sybil Attacks in the Tor Network. 189-204 - Moritz Volkmann
, Sascha Kaven
, Volker Skwarek
:
Security Metrics for False Data Injection in Smart Grids. 205-218 - Fiona Fuchs
, Felix Walter, Florian Tschorsch:
BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs. 219-233 - Iain Burge, Michel Barbeau, Joaquín García-Alfaro:
A Quantum Algorithm for Assessing Node Importance in the st-Connectivity Attack. 234-248 - August See, Benedikt Ostendorf, Lilly Sell, Mathias Fischer:
Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. 249-262 - Moritz Finke, Alexandra Dmitrienko:
Time-Aware Face Anti-spoofing with Rotation Invariant Local Binary Patterns and Deep Learning. 263-277

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.