


default search action
21st STM 2025: Toulouse, France
- Sokratis K. Katsikas

, Cristina Alcaraz
:
Security and Trust Management - 21st International Workshop, STM 2025, Toulouse, France, September 25-26, 2025, Proceedings. Lecture Notes in Computer Science 16137, Springer 2026, ISBN 978-3-032-06154-6
Identity Management, Authentication, Access Control and Formal Modeling
- Gianluca Sassetti

, Amir Sharif
, Roberto Carbone
, Silvio Ranise
:
Toward Secure and Trustworthy Identity Management Systems: A Knowledge-Base Driven Approach. 3-22 - Dennis Hamm

, Erwin Kupris
, Thomas Schreck
:
Always Authenticated, Never Exposed: Continuous Authentication via Zero-Knowledge Proofs. 23-42 - Barbara Fila

, Ermenda Hoxha:
Pragmatic Guidelines for Formal Modeling of Security Ceremonies. 43-62 - Clara Bertolissi

, Maribel Fernández:
Access Control Administration for Smart Homes. 63-80
AI and Machine Learning for Security
- Chi Zhang

, Muhammad Shadi Hajar
, Harsha Kalutarage
, Lankeshwara Munasinghe
:
Parameter-Efficient Fine-Tuning of LLMs for Intrusion Detection and Firewall Rule Generation: A Comparative Study. 83-98 - Crawford Brown, Nikolaos Pitropakis

, Christos Chrysoulas
, Costas Lambrinoudakis
:
ABusing Social Media and Sentiment Analysis for Stock Market Prediction. 99-117 - Davide Ferraris, Letizia Russo, Lorenzo Monti:

DrATC+: A Divide et Impera Extension to Trust-Based Dynamic Routing. 118-135
Cybersecurity Strategies, Regulations, Privacy
- Håvard Jakobsen Ofte

, Sokratis K. Katsikas
:
How to Train Your Guardian - Evaluating Cyber Security Exercises Using Situation Awareness. 139-158 - Javiera Alegría, Ivana Bachmann

, Javier Bustos-Jiménez
:
Google Tag Manager and Its Privacy Issues. 173-189
Cryptography and Threat Analysis
- Antony Dalmiere

, Zheng Zhou
, Guillaume Auriol
, Vincent Nicomette
, Pascal Marchand
:
Measuring Modern Phishing Tactics: A Quantitative Study of Body Obfuscation Prevalence, Co-occurrence, and Filter Impact. 193-209 - Guillaume Quispe, Pierre Jouvelot, Gérard Memmi:

Nicknames for Group Signatures. 210-230 - Ivan Costa

, Ivone Amorim
, Eva Maia
, Isabel Praça
:
The Impact of Filtering in Differential Cryptanalysis: A Case Study on FEAL-8. 231-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














