03763nam 22007095 450 99663677160331620251225185048.09783031763717(electronic bk.)978303176370010.1007/978-3-031-76371-7(MiAaPQ)EBC31855504(Au-PeEL)EBL31855504(CKB)37065130500041(DE-He213)978-3-031-76371-7(EXLCZ)993706513050004120241220d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecurity and Trust Management 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19–20, 2024, Proceedings /edited by Fabio Martinelli, Ruben Rios1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (159 pages)Lecture Notes in Computer Science,1611-3349 ;15235Print version: Martinelli, Fabio Security and Trust Management Cham : Springer,c2025 9783031763700 Includes bibliographical references and index. -- Trust, Anonymity and Identity. -- DrATC: Dynamic routing Algorithm based on Trust Characteristics. -- Distributed Dynamic Self-Control Anonymity Management Model. -- Machines Have Identities Too! Extending NIST’s SP 800-63 for Device Identity. -- Cryptography, Secure Computation and Formal Methods. -- On β−separating sets and deterministic factoring. -- Statistically secure multiparty computation of a biased coin. -- A Formal Approach For Modelling And Analysing Surgical Procedures. -- Operating Systems and Application Security. -- Flexible and Secure Process Confinement with eBPF. -- Dynamic Analysis for Explainable Fine-grained Android Malware Detection. -- A portable research honeypot for corporate network. -- Unleashing AI in Ethical Hacking.This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19–20, 2024 and co-located with ESORICS 2024 conference. The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.Lecture Notes in Computer Science,1611-3349 ;15235Data protectionComputer networksSoftware engineeringApplication softwareData miningSecurity ServicesData and Information SecurityComputer Communication NetworksSoftware EngineeringComputer and Information Systems ApplicationsData Mining and Knowledge DiscoveryData protection.Computer networks.Software engineering.Application software.Data mining.Security Services.Data and Information Security.Computer Communication Networks.Software Engineering.Computer and Information Systems Applications.Data Mining and Knowledge Discovery.005.8Martinelli FabioRios RubenMiAaPQMiAaPQMiAaPQ996636771603316Security and Trust Management3590338UNISA