| 2025 | A Fragile Watermarking Technique for Integrity Authentication of CSV-Files Using Invisible Line-Ending Control Characters. Florian Zimmer, Malte Hellmeier, Motoki Nakamura, Tobias Urbanek |
| 2025 | A Hybrid Approach to Improve the Intrusion Detection Systems Using Generative Artificial Intelligence and Deep Reinforcement Learning. Ines Ben Makhlouf, Ghassen Kilani, Fehmi Jaafar, Haïfa Nakouri |
| 2025 | A Hybrid-Based Transfer Learning Approach for IoT Device Identification. Stephanie M. Opoku, Habib Louafi, Malek Mouhoub |
| 2025 | A Method for Packed (and Unpacked) Malware Detection by Means of Convolutional Neural Networks. Giovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo |
| 2025 | A Mobile Payment Scheme Using Biometric Identification with Mutual Authentication. Jack Sturgess, Ivan Martinovic |
| 2025 | A Multi-Model Approach to Enhance Automatic Matching of Vulnerabilities to Attack Patterns. Marine Sauze-Kadar, Thomas Loubier |
| 2025 | A Resilient Randomization Technique Against ML-Driven Timing Side Channel Attack on Mobile Location. Abdeslam El-Yahyaoui, Mohammed Erradi |
| 2025 | A Safety-Centric Analysis and Benchmarks of Modern Open-Source Homomorphic Encryption Libraries. Nges Brian Njungle, Milan Stojkov, Michel A. Kinsy |
| 2025 | AI-Based Anomaly Detection and Classification of Traffic Using Netflow. Gustavo Gonzalez Granadillo, Nesrine Kaaniche |
| 2025 | Accelerating PEGASUS by Applying NTRU-Based GSW-Like Encryption. Shusaku Uemura, Kazuhide Fukushima |
| 2025 | Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security. Emilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah |
| 2025 | Addressing the C/C++ Vulnerability Datasets Limitation: The Good, the Bad and the Ugly. Claudio Curto, Daniela Giordano, Daniel Gustav Indelicato |
| 2025 | An ETSI GS QKD Compliant TLS Implementation. Thomas Prévost, Bruno Martin, Olivier Alibart |
| 2025 | An Enhanced Two-Step CPA Side-Channel Analysis Attack on ML-KEM. Mark Kennaway, Anh-Tuan Hoang, Ayesha Khalid, Ciara Rafferty, Máire O'Neill |
| 2025 | An NLP-Based Framework Leveraging Email and Multimodal User Data. Neda Baghalizadeh-Moghadam, Frédéric Cuppens, Nora Boulahia-Cuppens |
| 2025 | Anomaly Detection in ZkSync Transactions with Unsupervised Machine Learning. Kamil Kaczynski, Aleksander Wiacek |
| 2025 | Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 Simulator. Mahreen Khan, Maria Mushtaq, Renaud Pacalet, Ludovic Apvrille |
| 2025 | Beyond Rules: How Large Language Models Are Redefining Cryptographic Misuse Detection. Zohaib Masood, Miguel Vargas Martin |
| 2025 | Blockchain-Based Multi-Signature System for Critical Scenarios. Cristina Alcaraz, Davide Ferraris, Hector Guzman, Javier López |
| 2025 | Bolstering IIoT Resilience: The Synergy of Blockchain and CapBAC. Argiro Anagnostopoulou, Eleni Kehrioti, Ioannis Mavridis, Dimitris Gritzalis |
| 2025 | Can Contributing More Put You at a Higher Leakage Risk? The Relationship Between Shapley Value and Training Data Leakage Risks in Federated Learning. Soumia Zohra El Mestari, Maciej Krzysztof Zuziak, Gabriele Lenzini, Salvatore Rinzivillo |
| 2025 | Comparison of Credential Status Mechanisms for the Digital Wallet Ecosystem. Riccardo Germenia, Salvatore Manfredi, Giada Sciarretta, Mario Scuro, Alessandro Tomasi |
| 2025 | Control Flow Protection by Cryptographic Instruction Chaining. Shahzad Ahmad, Stefan Rass, Maksim Goman, Manfred Schlägl, Daniel Große |
| 2025 | Correlation Power Analysis on Ascon with Multi-Bit Selection Function. Viet Sang Nguyen, Vincent Grosso, Pierre-Louis Cayrel |
| 2025 | Dataset Watermarking Using the Discrete Wavelet Transform. Mike P. Raave, Devris Isler, Zekeriya Erkin |
| 2025 | Did You Break the Glass Properly? A Policy Compliance Framework for Protected Health Information (PHI) Emergency Access. Md. Al Amin, Rushabh Shah, Hemanth Tummala, Indrajit Ray |
| 2025 | EDQKD: Enhanced-Dynamic Quantum Key Distributions with Improved Security and Key Rate. Nikhil Kumar Parida, Sarath Babu, Neeraj Panwar, Virendra Singh |
| 2025 | EdgeFuzz: A Middleware-Based Security Testing Tool for Vulnerability Discovery in Distributed Computing Applications. Mishaal Ahmed, Muhammad Ajmal Naz |
| 2025 | Efficient Post-Processing of Intrusion Detection Alerts Using Data Mining and Clustering. Kalu Gamage Kavindu Induwara Kumarasinghe, Ilangan Pakshage Madhawi Pathum Kumarsiri, Harsha Sandaruwan Gardiyawasam Pussewalage, Kapuruka Abarana Gedara Thihara Vilochana Kumarasinghe, Kushan Sudheera Kalupahana Liyanage, Yahani Pinsara Manawadu, Haran Mamankaran |
| 2025 | Empirical Evaluation of Memory-Erasure Protocols. Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua |
| 2025 | Enhancing Access Control in Distributed Systems Through Intelligent ABAC Policy Mining. Sudhir Kumar Bai, Jason Aaron Goveas, Barsha Mitra |
| 2025 | Enhancing Anonymity for Electric Vehicles in the ISO 15118 Plug-and-Charge. Nethmi Hettiarachchi, Kalikinkar Mandal, Saqib Hakak |
| 2025 | Enhancing National Digital Identity Systems: A Framework for Institutional and Technical Harm Prevention Inspired by Microsoft's Harms Modeling. Giovanni Corti, Gianluca Sassetti, Amir Sharif, Roberto Carbone, Silvio Ranise |
| 2025 | Evaluating a Bimodal User Verification Robustness Against Synthetic Data Attacks. Sandeep Gupta, Rajesh Kumar, Kiran B. Raja, Bruno Crispo, Carsten Maple |
| 2025 | Evasive IPv6 Covert Channels: Design, Machine Learning Detection, and Explainable AI Evaluation. Viet Anh Phan, Jan Jerabek |
| 2025 | Extending Null Embedding for Deep Neural Network (DNN) Watermarking. Kaan Altinay, Devris Isler, Zekeriya Erkin |
| 2025 | From Real to Synthetic: GAN and DPGAN for Privacy Preserving Classifications. Mohammad Emadi, Vahideh Moghtadaiee, Mina Alishahi |
| 2025 | FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm. Shokofeh VahidianSadegh, Alberto Ibarrondo, Lena Wiese |
| 2025 | Hierarchical Colored Petri Nets for Vulnerability Detection in Software Architectures. Maya Benabdelhafid, Kamel Adi, Omer Landry Nguena-Timo, Luigi Logrippo |
| 2025 | Highlighting Vulnerabilities in a Genomics Biocybersecurity Lab Through Threat Modeling and Security Testing. Jared Sheldon, Isabelle Brown-Cantrell, Patrick Pape, Thomas H. Morris |
| 2025 | Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability. Tianxiang Dai, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp |
| 2025 | How to Design a Public Key Infrastructure for a Central Bank Digital Currency. Makan Rafiee, Lars Hupel |
| 2025 | I Know What You Bought Last Summer: Investigating User Data Leakage in E-Commerce Platforms. Ioannis Vlachogiannakis, Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos |
| 2025 | Insider Threats and Countermeasures Based on AI Lie Detection. Konstantinos Kalodanis, Panagiotis Rizomiliotis, Charalampos Papapavlou, Apostolos Skrekas, Stavros Papadimas, Dimosthenis Anagnostopoulos |
| 2025 | Large Language Models as Carriers of Hidden Messages. Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki |
| 2025 | Learning Personalized and Context-Aware Violation Detection Rules in Trigger-Action Apps. Mahsa Saeidi, Sai Sree Laya Chukkapalli, Anita Sarma, Rakesh B. Bobba |
| 2025 | Learning Without Sharing: A Comparative Study of Federated Learning Models for Healthcare. Anja Campmans, Mina Alishahi, Vahideh Moghtadaiee |
| 2025 | Lens Aberrations Detection and Digital Camera Identification with Convolutional Autoencoders. Jaroslaw Bernacki, Rafal Scherer |
| 2025 | MATRIX: A Comprehensive Graph-Based Framework for Malware Analysis and Threat Research. Marco Simoni, Andrea Saracino |
| 2025 | MICODE: A Minimal Code Design for Secret Sharing Scheme. Belkacem Imine, Rahul Saha, Mauro Conti |
| 2025 | MK-SEAC: Multi-Keyword Searchable Encryption with Access Control. Riccardo Longo, Enrico Sorbera, Valeria Vicard |
| 2025 | Masked Vector Sampling for HQC. Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage |
| 2025 | MorphDet: Towards the Detection of Morphing Attacks. Jival Kapoor, Priyanka Singh, Manoranjan Mohanty |
| 2025 | NULLDect: A Dynamic Adaptive Learning Framework for Robust NULL Pointer Dereference Detection. Tasmin Karim, Md. Shazzad Hossain Shaon, Md. Fahim Sultan, Alfredo Cuzzocrea, Mst. Shapna Akter |
| 2025 | New Integral Distinguishers and Security Reassessment of LTLBC. Abhilash Kumar Das |
| 2025 | On the Security of Opportunistic Re-Keying. Stefan Lucks, David Schatz, Guenter Schaefer |
| 2025 | Optimal Noise Injection on Training Data: A Defense Against Membership Inference Attacks. Radia Kassa, Kamel Adi, Myria Bouhaddi |
| 2025 | PPVFL-SplitNN: Privacy-Preserving Vertical Federated Learning with Split Neural Networks for Distributed Patient Data. Bashair Alrashed, Priyadarsi Nanda, Hoang Dinh, Amani Aldahiri, Hadeel Alhosaini, Nojood Alghamdi |
| 2025 | PRIVÉ: Towards Privacy-Preserving Swarm Attestation. Nada El Kassem, Wouter Hellemans, Ioannis Siachos, Edlira Dushku, Stefanos Vasileiadis, Dimitrios S. Karas, Liqun Chen, Constantinos Patsakis, Thanassis Giannetsos |
| 2025 | Post-Quantum Digital Signature Algorithms on IoT: Evaluating Performance on LoRa ESP32 Microcontroller. Mads Villum Nielsen, Magnus Raagaard Kjeldsen, Togu Turnip, Birger Andersen |
| 2025 | Post-Quantum Secure Channel Protocols for eSIMs: Design, Validation and Performance Analysis. Luk Bettale, Emmanuelle Dottax, Laurent Grémy |
| 2025 | Privacy Risks in Machine Learning: Truths and Myths. Josep Domingo-Ferrer |
| 2025 | Privacy-Enhancing Federated Time-Series Forecasting: A Microaggregation-Based Approach. Sargam Gupta, Vicenç Torra |
| 2025 | Privacy-Preserving EEG Data Generation: A Federated Split Learning Approach Using Privacy-Adaptive Autoencoders and Secure Aggregation with GFlowNet. Shouvik Paul, Garima Bajwa |
| 2025 | Privacy-Preserving Machine Learning in IoT: A Study of Data Obfuscation Methods. Yonan Yonan, Mohammad O. Abdullah, Felix Nilsson, Mahdi Fazeli, Ahmad Patooghy, Slawomir Nowaczyk |
| 2025 | Privacy2Practice: Leveraging Automated Analysis for Privacy Policy Transparency and Compliance. Saja Alqurashi, Indrakshi Ray |
| 2025 | Proceedings of the 22nd International Conference on Security and Cryptography, SECRYPT 2025, Bilbao, Spain, June 11-13, 2025. Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2025 | RAHE: A Robust Attribute-Based Aggregate Scheme Enhanced with Homomorphic Encryption for 5G-Connected Delivery Drones. Aagii Mariam Thomas, Sana Belguith |
| 2025 | RingAuth: User Authentication Using a Smart Ring. Jack Sturgess, Simon Birnbach, Simon Eberz, Ivan Martinovic |
| 2025 | Robust Peer-to-Peer Machine Learning Against Poisoning Attacks. Myria Bouhaddi, Kamel Adi |
| 2025 | SCAM: Secure Shared Cache Partitioning Scheme to Enhance Throughput of CMPs. Varun Venkitaraman, Rishab Ravi, Tejeshwar Bhagatsing Thorawade, Nirmal Kumar Boran, Virendra Singh |
| 2025 | SONNI: Secure Oblivious Neural Network Inference. Luke Sperling, Sandeep S. Kulkarni |
| 2025 | Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest. Federico Valbusa, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher |
| 2025 | Secure and Hybrid Clustering for IoT Networks: An Adaptive Dynamic Reconfigurability Approach. Osama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Ibrahim Haddadi |
| 2025 | Secure and Practical Cold (and Hot) Staking. Mario Larangeira |
| 2025 | Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhisperer. Mohsin Khan, Håvard D. Johansen, Dag Johansen |
| 2025 | Stegoslayer: A Robust Browser-Integrated Approach for Thwarting Stegomalware. Rushikesh Kawale, Sarath Babu, Virendra Singh |
| 2025 | Supporting Resilient, Ethical, and Verifiable Anonymous Identities Through Blockchains. Alberto De Marchi, Lorenzo Gigli, Andrea Melis, Luca Sciullo, Fabio Vitali |
| 2025 | Synthetic and (Un)Secure: Evaluating Generalized Membership Inference Attacks on Image Data. Pasquale Coscia, Stefano Ferrari, Vincenzo Piuri, Ayse Salman |
| 2025 | TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors. Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Mohammad Ebrahimabadi, Javad Bahrami, Hossein Pourmehrani, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi |
| 2025 | Threshold Structure-Preserving Signatures with Randomizable Key. Ahmet Ramazan Agirtas, Emircan Çelik, Sermin Kocaman, Fatih Sulak, Oguz Yayla |
| 2025 | Towards Quantum Machine Learning in Ransomware Detection. Francesco Mercaldo, Giovanni Ciaramella, Fabio Martinelli, Antonella Santone |
| 2025 | Trustworthy and Private AI/ML. Jaideep Vaidya |
| 2025 | UOV-Based Verifiable Timed Signature Scheme. Erkan Uslu, Oguz Yayla |
| 2025 | VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG). Md. Rakibul Hasan Talukder, Rakesh Podder, Indrajit Ray |
| 2025 | Weak, Weak-Insider, and Randomized Weak Privacy in the HPVP Model for RFID. Ferucio Laurentiu Tiplea |