


default search action
22nd SECRYPT 2025: Bilbao, Spain
- Sabrina De Capitani di Vimercati, Pierangela Samarati:

Proceedings of the 22nd International Conference on Security and Cryptography, SECRYPT 2025, Bilbao, Spain, June 11-13, 2025. SCITEPRESS 2025, ISBN 978-989-758-760-3
Invited Speakers
- Jaideep Vaidya:

Trustworthy and Private AI/ML. SECRYPT 2025: 5 - Josep Domingo-Ferrer:

Privacy Risks in Machine Learning: Truths and Myths. SECRYPT 2025: 7
Papers
- Bashair Alrashed, Priyadarsi Nanda, Hoang Dinh, Amani Aldahiri, Hadeel Alhosaini, Nojood Alghamdi:

PPVFL-SplitNN: Privacy-Preserving Vertical Federated Learning with Split Neural Networks for Distributed Patient Data. 13-24 - Sandeep Gupta

, Rajesh Kumar, Kiran B. Raja, Bruno Crispo, Carsten Maple:
Evaluating a Bimodal User Verification Robustness Against Synthetic Data Attacks. 25-36 - Shokofeh VahidianSadegh

, Alberto Ibarrondo, Lena Wiese:
FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm. 37-48 - Tianxiang Dai

, Yufan Jiang
, Yong Li, Jörn Müller-Quade, Andy Rupp:
Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability. 49-60 - Abdeslam El-Yahyaoui, Mohammed Erradi:

A Resilient Randomization Technique Against ML-Driven Timing Side Channel Attack on Mobile Location. 61-71 - Viet Sang Nguyen

, Vincent Grosso, Pierre-Louis Cayrel:
Correlation Power Analysis on Ascon with Multi-Bit Selection Function. 72-83 - Jaroslaw Bernacki, Rafal Scherer:

Lens Aberrations Detection and Digital Camera Identification with Convolutional Autoencoders. 84-95 - Jack Sturgess, Simon Birnbach, Simon Eberz, Ivan Martinovic:

RingAuth: User Authentication Using a Smart Ring. 96-107 - Luk Bettale, Emmanuelle Dottax, Laurent Grémy:

Post-Quantum Secure Channel Protocols for eSIMs: Design, Validation and Performance Analysis. 108-119 - Argiro Anagnostopoulou, Eleni Kehrioti

, Ioannis Mavridis, Dimitris Gritzalis:
Bolstering IIoT Resilience: The Synergy of Blockchain and CapBAC. 120-131 - Saja Alqurashi

, Indrakshi Ray:
Privacy2Practice: Leveraging Automated Analysis for Privacy Policy Transparency and Compliance. 132-143 - Varun Venkitaraman, Rishab Ravi, Tejeshwar Bhagatsing Thorawade, Nirmal Kumar Boran, Virendra Singh:

SCAM: Secure Shared Cache Partitioning Scheme to Enhance Throughput of CMPs. 144-155 - Ferucio Laurentiu Tiplea:

Weak, Weak-Insider, and Randomized Weak Privacy in the HPVP Model for RFID. 156-167 - Neda Baghalizadeh-Moghadam, Frédéric Cuppens, Nora Boulahia-Cuppens:

An NLP-Based Framework Leveraging Email and Multimodal User Data. 168-178 - Zohaib Masood, Miguel Vargas Martin:

Beyond Rules: How Large Language Models Are Redefining Cryptographic Misuse Detection. 179-194 - Md. Al Amin, Rushabh Shah, Hemanth Tummala, Indrajit Ray:

Did You Break the Glass Properly? A Policy Compliance Framework for Protected Health Information (PHI) Emergency Access. 195-208 - Reynaldo Gil Pons

, Sjouke Mauw, Rolando Trujillo-Rasua:
Empirical Evaluation of Memory-Erasure Protocols. 209-220 - Cristina Alcaraz, Davide Ferraris, Hector Guzman, Javier López:

Blockchain-Based Multi-Signature System for Critical Scenarios. 221-232 - Shahzad Ahmad

, Stefan Rass
, Maksim Goman, Manfred Schlägl
, Daniel Große
:
Control Flow Protection by Cryptographic Instruction Chaining. 233-246 - Nada El Kassem, Wouter Hellemans, Ioannis Siachos

, Edlira Dushku, Stefanos Vasileiadis, Dimitrios S. Karas, Liqun Chen, Constantinos Patsakis, Thanassis Giannetsos:
PRIVÉ: Towards Privacy-Preserving Swarm Attestation. 247-262 - Mark Kennaway

, Anh-Tuan Hoang, Ayesha Khalid, Ciara Rafferty, Máire O'Neill:
An Enhanced Two-Step CPA Side-Channel Analysis Attack on ML-KEM. 263-274 - Soumia Zohra El Mestari, Maciej Krzysztof Zuziak, Gabriele Lenzini, Salvatore Rinzivillo:

Can Contributing More Put You at a Higher Leakage Risk? The Relationship Between Shapley Value and Training Data Leakage Risks in Federated Learning. 275-286 - Pasquale Coscia, Stefano Ferrari, Vincenzo Piuri, Ayse Salman:

Synthetic and (Un)Secure: Evaluating Generalized Membership Inference Attacks on Image Data. 287-297 - Francesco Mercaldo, Giovanni Ciaramella, Fabio Martinelli, Antonella Santone:

Towards Quantum Machine Learning in Ransomware Detection. 301-308 - Stephanie M. Opoku, Habib Louafi, Malek Mouhoub:

A Hybrid-Based Transfer Learning Approach for IoT Device Identification. 309-320 - Konstantinos Kalodanis, Panagiotis Rizomiliotis, Charalampos Papapavlou, Apostolos Skrekas, Stavros Papadimas, Dimosthenis Anagnostopoulos:

Insider Threats and Countermeasures Based on AI Lie Detection. 321-328 - Stefan Lucks, David Schatz, Guenter Schaefer:

On the Security of Opportunistic Re-Keying. 329-338 - Mario Larangeira:

Secure and Practical Cold (and Hot) Staking. 339-346 - Yonan Yonan, Mohammad O. Abdullah, Felix Nilsson, Mahdi Fazeli, Ahmad Patooghy, Slawomir Nowaczyk:

Privacy-Preserving Machine Learning in IoT: A Study of Data Obfuscation Methods. 347-354 - Claudio Curto, Daniela Giordano, Daniel Gustav Indelicato:

Addressing the C/C++ Vulnerability Datasets Limitation: The Good, the Bad and the Ugly. 355-362 - Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki:

Large Language Models as Carriers of Hidden Messages. 363-371 - Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Mohammad Ebrahimabadi, Javad Bahrami, Hossein Pourmehrani, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:

TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors. SECRYPT 2025: 372-380 - Belkacem Imine, Rahul Saha, Mauro Conti:

MICODE: A Minimal Code Design for Secret Sharing Scheme. 381-391 - Ioannis Vlachogiannakis, Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos:

I Know What You Bought Last Summer: Investigating User Data Leakage in E-Commerce Platforms. 392-399 - Aagii Mariam Thomas

, Sana Belguith
:
RAHE: A Robust Attribute-Based Aggregate Scheme Enhanced with Homomorphic Encryption for 5G-Connected Delivery Drones. 400-411 - Osama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Ibrahim Haddadi

:
Secure and Hybrid Clustering for IoT Networks: An Adaptive Dynamic Reconfigurability Approach. 412-419 - Md. Rakibul Hasan Talukder, Rakesh Podder, Indrajit Ray:

VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG). 420-428 - Mahsa Saeidi, Sai Sree Laya Chukkapalli, Anita Sarma, Rakesh B. Bobba:

Learning Personalized and Context-Aware Violation Detection Rules in Trigger-Action Apps. 429-442 - Riccardo Longo, Enrico Sorbera

, Valeria Vicard:
MK-SEAC: Multi-Keyword Searchable Encryption with Access Control. 443-454 - Florian Zimmer

, Malte Hellmeier, Motoki Nakamura, Tobias Urbanek:
A Fragile Watermarking Technique for Integrity Authentication of CSV-Files Using Invisible Line-Ending Control Characters. 455-466 - Ines Ben Makhlouf, Ghassen Kilani, Fehmi Jaafar, Haïfa Nakouri:

A Hybrid Approach to Improve the Intrusion Detection Systems Using Generative Artificial Intelligence and Deep Reinforcement Learning. 467-474 - Nethmi Hettiarachchi, Kalikinkar Mandal, Saqib Hakak:

Enhancing Anonymity for Electric Vehicles in the ISO 15118 Plug-and-Charge. 475-482 - Nges Brian Njungle, Milan Stojkov, Michel A. Kinsy:

A Safety-Centric Analysis and Benchmarks of Modern Open-Source Homomorphic Encryption Libraries. 483-494 - Marco Simoni

, Andrea Saracino:
MATRIX: A Comprehensive Graph-Based Framework for Malware Analysis and Threat Research. 495-502 - Sudhir Kumar Bai, Jason Aaron Goveas, Barsha Mitra:

Enhancing Access Control in Distributed Systems Through Intelligent ABAC Policy Mining. 503-514 - Luke Sperling, Sandeep S. Kulkarni:

SONNI: Secure Oblivious Neural Network Inference. 515-522 - Maya Benabdelhafid, Kamel Adi, Omer Landry Nguena-Timo, Luigi Logrippo:

Hierarchical Colored Petri Nets for Vulnerability Detection in Software Architectures. 523-530 - Radia Kassa, Kamel Adi, Myria Bouhaddi:

Optimal Noise Injection on Training Data: A Defense Against Membership Inference Attacks. 531-538 - Myria Bouhaddi, Kamel Adi:

Robust Peer-to-Peer Machine Learning Against Poisoning Attacks. 539-546 - Emilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah:

Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security. 547-554 - Giovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo:

A Method for Packed (and Unpacked) Malware Detection by Means of Convolutional Neural Networks. 557-564 - Kamil Kaczynski

, Aleksander Wiacek
:
Anomaly Detection in ZkSync Transactions with Unsupervised Machine Learning. 565-570 - Tasmin Karim, Md. Shazzad Hossain Shaon, Md. Fahim Sultan, Alfredo Cuzzocrea, Mst. Shapna Akter:

NULLDect: A Dynamic Adaptive Learning Framework for Robust NULL Pointer Dereference Detection. 571-576 - Jack Sturgess, Ivan Martinovic:

A Mobile Payment Scheme Using Biometric Identification with Mutual Authentication. 577-585 - Nikhil Kumar Parida, Sarath Babu, Neeraj Panwar, Virendra Singh:

EDQKD: Enhanced-Dynamic Quantum Key Distributions with Improved Security and Key Rate. 586-591 - Mads Villum Nielsen, Magnus Raagaard Kjeldsen, Togu Turnip, Birger Andersen

:
Post-Quantum Digital Signature Algorithms on IoT: Evaluating Performance on LoRa ESP32 Microcontroller. 592-600 - Rushikesh Kawale, Sarath Babu, Virendra Singh:

Stegoslayer: A Robust Browser-Integrated Approach for Thwarting Stegomalware. 601-606 - Mahreen Khan, Maria Mushtaq, Renaud Pacalet, Ludovic Apvrille:

Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 Simulator. 607-612 - Erkan Uslu, Oguz Yayla:

UOV-Based Verifiable Timed Signature Scheme. 613-618 - Mishaal Ahmed, Muhammad Ajmal Naz:

EdgeFuzz: A Middleware-Based Security Testing Tool for Vulnerability Discovery in Distributed Computing Applications. 619-625 - Jared Sheldon, Isabelle Brown-Cantrell, Patrick Pape, Thomas H. Morris:

Highlighting Vulnerabilities in a Genomics Biocybersecurity Lab Through Threat Modeling and Security Testing. 626-631 - Ahmet Ramazan Agirtas

, Emircan Çelik, Sermin Kocaman, Fatih Sulak, Oguz Yayla:
Threshold Structure-Preserving Signatures with Randomizable Key. 632-637 - Shouvik Paul, Garima Bajwa:

Privacy-Preserving EEG Data Generation: A Federated Split Learning Approach Using Privacy-Adaptive Autoencoders and Secure Aggregation with GFlowNet. 638-643 - Gustavo Gonzalez Granadillo, Nesrine Kaaniche:

AI-Based Anomaly Detection and Classification of Traffic Using Netflow. 644-649 - Shusaku Uemura, Kazuhide Fukushima:

Accelerating PEGASUS by Applying NTRU-Based GSW-Like Encryption. 650-657 - Marine Sauze-Kadar, Thomas Loubier:

A Multi-Model Approach to Enhance Automatic Matching of Vulnerabilities to Attack Patterns. 658-665 - Viet Anh Phan

, Jan Jerabek:
Evasive IPv6 Covert Channels: Design, Machine Learning Detection, and Explainable AI Evaluation. 666-675 - Mike P. Raave, Devris Isler, Zekeriya Erkin

:
Dataset Watermarking Using the Discrete Wavelet Transform. 676-681 - Kalu Gamage Kavindu Induwara Kumarasinghe, Ilangan Pakshage Madhawi Pathum Kumarsiri, Harsha Sandaruwan Gardiyawasam Pussewalage, Kapuruka Abarana Gedara Thihara Vilochana Kumarasinghe, Kushan Sudheera Kalupahana Liyanage, Yahani Pinsara Manawadu, Haran Mamankaran:

Efficient Post-Processing of Intrusion Detection Alerts Using Data Mining and Clustering. 682-689 - Mohsin Khan

, Håvard D. Johansen, Dag Johansen:
Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhisperer. 690-695 - Makan Rafiee, Lars Hupel:

How to Design a Public Key Infrastructure for a Central Bank Digital Currency. 696-704 - Thomas Prévost, Bruno Martin, Olivier Alibart:

An ETSI GS QKD Compliant TLS Implementation. 705-710 - Mohammad Emadi, Vahideh Moghtadaiee

, Mina Alishahi:
From Real to Synthetic: GAN and DPGAN for Privacy Preserving Classifications. 711-716 - Abhilash Kumar Das:

New Integral Distinguishers and Security Reassessment of LTLBC. 717-722 - Giovanni Corti, Gianluca Sassetti, Amir Sharif, Roberto Carbone, Silvio Ranise:

Enhancing National Digital Identity Systems: A Framework for Institutional and Technical Harm Prevention Inspired by Microsoft's Harms Modeling. 723-728 - Jival Kapoor, Priyanka Singh, Manoranjan Mohanty:

MorphDet: Towards the Detection of Morphing Attacks. 729-734 - Anja Campmans, Mina Alishahi, Vahideh Moghtadaiee

:
Learning Without Sharing: A Comparative Study of Federated Learning Models for Healthcare. 735-740 - Riccardo Germenia

, Salvatore Manfredi
, Giada Sciarretta, Mario Scuro, Alessandro Tomasi
:
Comparison of Credential Status Mechanisms for the Digital Wallet Ecosystem. 741-749 - Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage:

Masked Vector Sampling for HQC. 750-758 - Federico Valbusa, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher:

Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest. 759-764 - Sargam Gupta, Vicenç Torra:

Privacy-Enhancing Federated Time-Series Forecasting: A Microaggregation-Based Approach. 765-770 - Kaan Altinay, Devris Isler, Zekeriya Erkin

:
Extending Null Embedding for Deep Neural Network (DNN) Watermarking. 771-776 - Alberto De Marchi, Lorenzo Gigli, Andrea Melis, Luca Sciullo, Fabio Vitali

:
Supporting Resilient, Ethical, and Verifiable Anonymous Identities Through Blockchains. 777-782

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














