LEADER 03763nam 22007095 450 001 996636771603316 005 20251225185048.0 010 $a9783031763717$b(electronic bk.) 010 $z9783031763700 024 7 $a10.1007/978-3-031-76371-7 035 $a(MiAaPQ)EBC31855504 035 $a(Au-PeEL)EBL31855504 035 $a(CKB)37065130500041 035 $a(DE-He213)978-3-031-76371-7 035 $a(EXLCZ)9937065130500041 100 $a20241220d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Trust Management $e20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19?20, 2024, Proceedings /$fedited by Fabio Martinelli, Ruben Rios 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (159 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15235 311 08$aPrint version: Martinelli, Fabio Security and Trust Management Cham : Springer,c2025 9783031763700 320 $aIncludes bibliographical references and index. 327 $a -- Trust, Anonymity and Identity. -- DrATC: Dynamic routing Algorithm based on Trust Characteristics. -- Distributed Dynamic Self-Control Anonymity Management Model. -- Machines Have Identities Too! Extending NIST?s SP 800-63 for Device Identity. -- Cryptography, Secure Computation and Formal Methods. -- On ??separating sets and deterministic factoring. -- Statistically secure multiparty computation of a biased coin. -- A Formal Approach For Modelling And Analysing Surgical Procedures. -- Operating Systems and Application Security. -- Flexible and Secure Process Confinement with eBPF. -- Dynamic Analysis for Explainable Fine-grained Android Malware Detection. -- A portable research honeypot for corporate network. -- Unleashing AI in Ethical Hacking. 330 $aThis book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19?20, 2024 and co-located with ESORICS 2024 conference. The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15235 606 $aData protection 606 $aComputer networks 606 $aSoftware engineering 606 $aApplication software 606 $aData mining 606 $aSecurity Services 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aComputer and Information Systems Applications 606 $aData Mining and Knowledge Discovery 615 0$aData protection. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aData mining. 615 14$aSecurity Services. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aComputer and Information Systems Applications. 615 24$aData Mining and Knowledge Discovery. 676 $a005.8 702 $aMartinelli$b Fabio 702 $aRios$b Ruben 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996636771603316 996 $aSecurity and Trust Management$93590338 997 $aUNISA