04530nam 22006375 450 991100369530332120250515130317.03-031-92886-510.1007/978-3-031-92886-4(CKB)38815598100041(DE-He213)978-3-031-92886-4(MiAaPQ)EBC32123032(Au-PeEL)EBL32123032(OCoLC)1524425302(EXLCZ)993881559810004120250515d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierICT Systems Security and Privacy Protection 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II /edited by Lili Nemec Zlatolas, Kai Rannenberg, Tatjana Welzer, Joaquin Garcia-Alfaro1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XIV, 280 p. 46 illus., 33 illus. in color.) IFIP Advances in Information and Communication Technology,1868-422X ;7463-031-92885-7 -- Applied Cryptography. -- CoolTest: Improved Randomness Testing Using Boolean Functions. -- Towards a lightweight and privacy friendly Architecture for Online Advertising. -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. -- Data and Application Security. -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. -- Time is money: A temporal model of cybersecurity. -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. -- ”You still have to study” On the Security of LLM generated code. -- Certifiably robust malware detectors by design. -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. -- International Workshop on Network and Distributed Systems Security (WNDSS 2025). -- A Novel Evidence-Based Threat Enumeration Methodology for ICS. -- Impact Analysis of Sybil Attacks in the Tor Network. -- Security Metrics for False Data Injection in Smart Grids. -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).IFIP Advances in Information and Communication Technology,1868-422X ;746ComputersComputer networksCryptographyData encryption (Computer science)Computing MilieuxComputer Communication NetworksCryptologyComputers.Computer networks.Cryptography.Data encryption (Computer science)Computing Milieux.Computer Communication Networks.Cryptology.004Nemec Zlatolas Liliedthttp://id.loc.gov/vocabulary/relators/edtRannenberg Kaiedthttp://id.loc.gov/vocabulary/relators/edtWelzer Tatjanaedthttp://id.loc.gov/vocabulary/relators/edtGarcia-Alfaro Joaquinedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9911003695303321ICT Systems Security and Privacy Protection2034030UNINA