Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

1147389516
Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

139.99 Pre Order
Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II

Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II

Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II

Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II

Paperback

$139.99 
  • SHIP THIS ITEM
    Available for Pre-Order. This item will be released on July 21, 2025

Related collections and offers


Overview

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.


Product Details

ISBN-13: 9783031957635
Publisher: Springer Nature Switzerland
Publication date: 07/21/2025
Series: Lecture Notes in Computer Science , #15826
Pages: 534
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Side Channels: Not So Secure TSC.- G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels.- Decompose and conquer: ZVP attacks on GLV curves.- Wolf in Sheep’s Clothing: Understanding and Detecting Mobile Cloaking in Blackhat. Informatuion Security: Optimal Communication Unbalanced Private Set Union.- Negative Results on Information-theoretic Additive Randomized Encodings.- Two-party ECDSA with JavaCard-based smartcards.- MSED: A Linguistic Steganalysis Method Based on Multi-Granularity Semantic Extraction Using Dual-Mode Fusion. Privacy & Anonymity: Privately Compute the Item with Maximal Weight Sum in Set Intersection.- Algebraic Zero Knowledge Contingent Payment.- On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme.- AQQUA: Augmenting Quisquis with Auditability. Cryptanalysis: Security Analysis of Forward Secure Log Sealing in Journald.- Generic Security of GCM-SST.- Revisiting the attacker’s knowledge in inference attacks against Searchable Symmetric Encryption.- On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers. Attacks & Vulnerabilities: CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations.- OCEAN: Open-World Contrastive Authorship Identification.- The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach.- Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework.

From the B&N Reads Blog

Customer Reviews