LEADER 04530nam 22006375 450 001 9911003695303321 005 20250515130317.0 010 $a3-031-92886-5 024 7 $a10.1007/978-3-031-92886-4 035 $a(CKB)38815598100041 035 $a(DE-He213)978-3-031-92886-4 035 $a(MiAaPQ)EBC32123032 035 $a(Au-PeEL)EBL32123032 035 $a(OCoLC)1524425302 035 $a(EXLCZ)9938815598100041 100 $a20250515d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21?23, 2025, Proceedings, Part II /$fedited by Lili Nemec Zlatolas, Kai Rannenberg, Tatjana Welzer, Joaquin Garcia-Alfaro 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XIV, 280 p. 46 illus., 33 illus. in color.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v746 311 08$a3-031-92885-7 327 $a -- Applied Cryptography. -- CoolTest: Improved Randomness Testing Using Boolean Functions. -- Towards a lightweight and privacy friendly Architecture for Online Advertising. -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. -- Data and Application Security. -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. -- Time is money: A temporal model of cybersecurity. -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. -- ?You still have to study? On the Security of LLM generated code. -- Certifiably robust malware detectors by design. -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. -- International Workshop on Network and Distributed Systems Security (WNDSS 2025). -- A Novel Evidence-Based Threat Enumeration Methodology for ICS. -- Impact Analysis of Sybil Attacks in the Tor Network. -- Security Metrics for False Data Injection in Smart Grids. -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning. 330 $aThe two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025). 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v746 606 $aComputers 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aCryptology 615 0$aComputers. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a004 702 $aNemec Zlatolas$b Lili$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRannenberg$b Kai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWelzer$b Tatjana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911003695303321 996 $aICT Systems Security and Privacy Protection$92034030 997 $aUNINA