


default search action
22nd SECRYPT 2025: Bilbao, Spain
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Proceedings of the 22nd International Conference on Security and Cryptography, SECRYPT 2025, Bilbao, Spain, June 11-13, 2025. SCITEPRESS 2025, ISBN 978-989-758-760-3
Invited Speakers
- Jaideep Vaidya:
Trustworthy and Private AI/ML. SECRYPT 2025: 5 - Josep Domingo-Ferrer:
Privacy Risks in Machine Learning: Truths and Myths. SECRYPT 2025: 7
Papers
- Bashair Alrashed, Priyadarsi Nanda, Hoang Dinh, Amani Aldahiri, Hadeel Alhosaini, Nojood Alghamdi:
PPVFL-SplitNN: Privacy-Preserving Vertical Federated Learning with Split Neural Networks for Distributed Patient Data. 13-24 - Sandeep Gupta, Rajesh Kumar, Kiran B. Raja, Bruno Crispo, Carsten Maple:
Evaluating a Bimodal User Verification Robustness Against Synthetic Data Attacks. 25-36 - Shokofeh VahidianSadegh
, Alberto Ibarrondo, Lena Wiese:
FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm. 37-48 - Tianxiang Dai
, Yufan Jiang
, Yong Li, Jörn Müller-Quade, Andy Rupp:
Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability. 49-60 - Abdeslam El-Yahyaoui, Mohammed Erradi:
A Resilient Randomization Technique Against ML-Driven Timing Side Channel Attack on Mobile Location. 61-71 - Viet Sang Nguyen
, Vincent Grosso, Pierre-Louis Cayrel:
Correlation Power Analysis on Ascon with Multi-Bit Selection Function. 72-83 - Jaroslaw Bernacki, Rafal Scherer:
Lens Aberrations Detection and Digital Camera Identification with Convolutional Autoencoders. 84-95 - Jack Sturgess, Simon Birnbach, Simon Eberz, Ivan Martinovic:
RingAuth: User Authentication Using a Smart Ring. 96-107 - Luk Bettale, Emmanuelle Dottax, Laurent Grémy:
Post-Quantum Secure Channel Protocols for eSIMs: Design, Validation and Performance Analysis. 108-119 - Argiro Anagnostopoulou, Eleni Kehrioti, Ioannis Mavridis, Dimitris Gritzalis:
Bolstering IIoT Resilience: The Synergy of Blockchain and CapBAC. 120-131 - Saja Alqurashi, Indrakshi Ray:
Privacy2Practice: Leveraging Automated Analysis for Privacy Policy Transparency and Compliance. 132-143 - Varun Venkitaraman, Rishab Ravi, Tejeshwar Bhagatsing Thorawade, Nirmal Kumar Boran, Virendra Singh:
SCAM: Secure Shared Cache Partitioning Scheme to Enhance Throughput of CMPs. 144-155 - Ferucio Laurentiu Tiplea:
Weak, Weak-Insider, and Randomized Weak Privacy in the HPVP Model for RFID. 156-167 - Neda Baghalizadeh-Moghadam, Frédéric Cuppens, Nora Boulahia-Cuppens:
An NLP-Based Framework Leveraging Email and Multimodal User Data. 168-178 - Zohaib Masood, Miguel Vargas Martin:
Beyond Rules: How Large Language Models Are Redefining Cryptographic Misuse Detection. 179-194 - Md. Al Amin, Rushabh Shah, Hemanth Tummala, Indrajit Ray:
Did You Break the Glass Properly? A Policy Compliance Framework for Protected Health Information (PHI) Emergency Access. 195-208 - Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Empirical Evaluation of Memory-Erasure Protocols. 209-220 - Cristina Alcaraz, Davide Ferraris, Hector Guzman, Javier López:
Blockchain-Based Multi-Signature System for Critical Scenarios. 221-232 - Shahzad Ahmad, Stefan Rass, Maksim Goman, Manfred Schlägl, Daniel Große:
Control Flow Protection by Cryptographic Instruction Chaining. 233-246 - Nada El Kassem, Wouter Hellemans, Ioannis Siachos
, Edlira Dushku, Stefanos Vasileiadis, Dimitrios S. Karas, Liqun Chen, Constantinos Patsakis, Thanassis Giannetsos:
PRIVÉ: Towards Privacy-Preserving Swarm Attestation. 247-262 - Mark Kennaway
, Anh-Tuan Hoang, Ayesha Khalid, Ciara Rafferty, Máire O'Neill:
An Enhanced Two-Step CPA Side-Channel Analysis Attack on ML-KEM. 263-274 - Soumia Zohra El Mestari, Maciej Krzysztof Zuziak, Gabriele Lenzini, Salvatore Rinzivillo:
Can Contributing More Put You at a Higher Leakage Risk? The Relationship Between Shapley Value and Training Data Leakage Risks in Federated Learning. 275-286 - Pasquale Coscia, Stefano Ferrari, Vincenzo Piuri, Ayse Salman:
Synthetic and (Un)Secure: Evaluating Generalized Membership Inference Attacks on Image Data. 287-297 - Francesco Mercaldo, Giovanni Ciaramella, Fabio Martinelli, Antonella Santone:
Towards Quantum Machine Learning in Ransomware Detection. 301-308 - Stephanie M. Opoku, Habib Louafi, Malek Mouhoub:
A Hybrid-Based Transfer Learning Approach for IoT Device Identification. 309-320 - Konstantinos Kalodanis, Panagiotis Rizomiliotis, Charalampos Papapavlou, Apostolos Skrekas, Stavros Papadimas, Dimosthenis Anagnostopoulos:
Insider Threats and Countermeasures Based on AI Lie Detection. 321-328 - Stefan Lucks, David Schatz, Guenter Schaefer:
On the Security of Opportunistic Re-Keying. 329-338 - Mario Larangeira:
Secure and Practical Cold (and Hot) Staking. 339-346 - Yonan Yonan, Mohammad O. Abdullah, Felix Nilsson, Mahdi Fazeli, Ahmad Patooghy, Slawomir Nowaczyk:
Privacy-Preserving Machine Learning in IoT: A Study of Data Obfuscation Methods. 347-354 - Claudio Curto, Daniela Giordano, Daniel Gustav Indelicato:
Addressing the C/C++ Vulnerability Datasets Limitation: The Good, the Bad and the Ugly. 355-362 - Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki:
Large Language Models as Carriers of Hidden Messages. 363-371 - Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Mohammad Ebrahimabadi, Javad Bahrami, Hossein Pourmehrani, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
TIGER: TrIaGing KEy Refreshing Frequency via Digital Sensors. SECRYPT 2025: 372-380 - Belkacem Imine, Rahul Saha, Mauro Conti:
MICODE: A Minimal Code Design for Secret Sharing Scheme. 381-391 - Ioannis Vlachogiannakis, Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos:
I Know What You Bought Last Summer: Investigating User Data Leakage in E-Commerce Platforms. 392-399 - Aagii Mariam Thomas
, Sana Belguith
:
RAHE: A Robust Attribute-Based Aggregate Scheme Enhanced with Homomorphic Encryption for 5G-Connected Delivery Drones. 400-411 - Osama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Ibrahim Haddadi:
Secure and Hybrid Clustering for IoT Networks: An Adaptive Dynamic Reconfigurability Approach. 412-419 - Md. Rakibul Hasan Talukder, Rakesh Podder, Indrajit Ray:
VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG). 420-428 - Mahsa Saeidi, Sai Sree Laya Chukkapalli, Anita Sarma, Rakesh B. Bobba:
Learning Personalized and Context-Aware Violation Detection Rules in Trigger-Action Apps. 429-442 - Riccardo Longo, Enrico Sorbera
, Valeria Vicard:
MK-SEAC: Multi-Keyword Searchable Encryption with Access Control. 443-454 - Florian Zimmer, Malte Hellmeier, Motoki Nakamura, Tobias Urbanek:
A Fragile Watermarking Technique for Integrity Authentication of CSV-Files Using Invisible Line-Ending Control Characters. 455-466 - Ines Ben Makhlouf, Ghassen Kilani, Fehmi Jaafar, Haïfa Nakouri:
A Hybrid Approach to Improve the Intrusion Detection Systems Using Generative Artificial Intelligence and Deep Reinforcement Learning. 467-474 - Nethmi Hettiarachchi, Kalikinkar Mandal, Saqib Hakak:
Enhancing Anonymity for Electric Vehicles in the ISO 15118 Plug-and-Charge. 475-482 - Nges Brian Njungle, Milan Stojkov, Michel A. Kinsy:
A Safety-Centric Analysis and Benchmarks of Modern Open-Source Homomorphic Encryption Libraries. 483-494 - Marco Simoni, Andrea Saracino:
MATRIX: A Comprehensive Graph-Based Framework for Malware Analysis and Threat Research. 495-502 - Sudhir Kumar Bai, Jason Aaron Goveas, Barsha Mitra:
Enhancing Access Control in Distributed Systems Through Intelligent ABAC Policy Mining. 503-514 - Luke Sperling, Sandeep S. Kulkarni:
SONNI: Secure Oblivious Neural Network Inference. 515-522 - Maya Benabdelhafid, Kamel Adi, Omer Landry Nguena-Timo, Luigi Logrippo:
Hierarchical Colored Petri Nets for Vulnerability Detection in Software Architectures. 523-530 - Radia Kassa, Kamel Adi, Myria Bouhaddi:
Optimal Noise Injection on Training Data: A Defense Against Membership Inference Attacks. 531-538 - Myria Bouhaddi, Kamel Adi:
Robust Peer-to-Peer Machine Learning Against Poisoning Attacks. 539-546 - Emilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah:
Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security. 547-554 - Giovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo:
A Method for Packed (and Unpacked) Malware Detection by Means of Convolutional Neural Networks. 557-564 - Kamil Kaczynski, Aleksander Wiacek:
Anomaly Detection in ZkSync Transactions with Unsupervised Machine Learning. 565-570 - Tasmin Karim, Md. Shazzad Hossain Shaon, Md. Fahim Sultan, Alfredo Cuzzocrea, Mst. Shapna Akter:
NULLDect: A Dynamic Adaptive Learning Framework for Robust NULL Pointer Dereference Detection. 571-576 - Jack Sturgess, Ivan Martinovic:
A Mobile Payment Scheme Using Biometric Identification with Mutual Authentication. 577-585 - Nikhil Kumar Parida, Sarath Babu, Neeraj Panwar, Virendra Singh:
EDQKD: Enhanced-Dynamic Quantum Key Distributions with Improved Security and Key Rate. 586-591 - Mads Villum Nielsen, Magnus Raagaard Kjeldsen, Togu Turnip, Birger Andersen:
Post-Quantum Digital Signature Algorithms on IoT: Evaluating Performance on LoRa ESP32 Microcontroller. 592-600 - Rushikesh Kawale, Sarath Babu, Virendra Singh:
Stegoslayer: A Robust Browser-Integrated Approach for Thwarting Stegomalware. 601-606 - Mahreen Khan, Maria Mushtaq, Renaud Pacalet, Ludovic Apvrille:
Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 Simulator. 607-612 - Erkan Uslu, Oguz Yayla:
UOV-Based Verifiable Timed Signature Scheme. 613-618 - Mishaal Ahmed, Muhammad Ajmal Naz:
EdgeFuzz: A Middleware-Based Security Testing Tool for Vulnerability Discovery in Distributed Computing Applications. 619-625 - Jared Sheldon, Isabelle Brown-Cantrell, Patrick Pape, Thomas H. Morris:
Highlighting Vulnerabilities in a Genomics Biocybersecurity Lab Through Threat Modeling and Security Testing. 626-631 - Ahmet Ramazan Agirtas
, Emircan Çelik, Sermin Kocaman, Fatih Sulak, Oguz Yayla:
Threshold Structure-Preserving Signatures with Randomizable Key. 632-637 - Shouvik Paul, Garima Bajwa:
Privacy-Preserving EEG Data Generation: A Federated Split Learning Approach Using Privacy-Adaptive Autoencoders and Secure Aggregation with GFlowNet. 638-643 - Gustavo Gonzalez Granadillo, Nesrine Kaaniche:
AI-Based Anomaly Detection and Classification of Traffic Using Netflow. 644-649 - Shusaku Uemura, Kazuhide Fukushima:
Accelerating PEGASUS by Applying NTRU-Based GSW-Like Encryption. 650-657 - Marine Sauze-Kadar, Thomas Loubier:
A Multi-Model Approach to Enhance Automatic Matching of Vulnerabilities to Attack Patterns. 658-665 - Viet Anh Phan
, Jan Jerabek:
Evasive IPv6 Covert Channels: Design, Machine Learning Detection, and Explainable AI Evaluation. 666-675 - Mike P. Raave, Devris Isler, Zekeriya Erkin
:
Dataset Watermarking Using the Discrete Wavelet Transform. 676-681 - Kalu Gamage Kavindu Induwara Kumarasinghe, Ilangan Pakshage Madhawi Pathum Kumarsiri, Harsha Sandaruwan Gardiyawasam Pussewalage, Kapuruka Abarana Gedara Thihara Vilochana Kumarasinghe, Kushan Sudheera Kalupahana Liyanage, Yahani Pinsara Manawadu, Haran Mamankaran:
Efficient Post-Processing of Intrusion Detection Alerts Using Data Mining and Clustering. 682-689 - Mohsin Khan, Håvard D. Johansen, Dag Johansen:
Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhisperer. 690-695 - Makan Rafiee, Lars Hupel:
How to Design a Public Key Infrastructure for a Central Bank Digital Currency. 696-704 - Thomas Prévost, Bruno Martin, Olivier Alibart:
An ETSI GS QKD Compliant TLS Implementation. 705-710 - Mohammad Emadi, Vahideh Moghtadaiee
, Mina Alishahi:
From Real to Synthetic: GAN and DPGAN for Privacy Preserving Classifications. 711-716 - Abhilash Kumar Das:
New Integral Distinguishers and Security Reassessment of LTLBC. 717-722 - Giovanni Corti, Gianluca Sassetti, Amir Sharif, Roberto Carbone, Silvio Ranise:
Enhancing National Digital Identity Systems: A Framework for Institutional and Technical Harm Prevention Inspired by Microsoft's Harms Modeling. 723-728 - Jival Kapoor, Priyanka Singh, Manoranjan Mohanty:
MorphDet: Towards the Detection of Morphing Attacks. 729-734 - Anja Campmans, Mina Alishahi, Vahideh Moghtadaiee
:
Learning Without Sharing: A Comparative Study of Federated Learning Models for Healthcare. 735-740 - Riccardo Germenia, Salvatore Manfredi
, Giada Sciarretta, Mario Scuro, Alessandro Tomasi:
Comparison of Credential Status Mechanisms for the Digital Wallet Ecosystem. 741-749 - Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage:
Masked Vector Sampling for HQC. 750-758 - Federico Valbusa, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher:
Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest. 759-764 - Sargam Gupta, Vicenç Torra:
Privacy-Enhancing Federated Time-Series Forecasting: A Microaggregation-Based Approach. 765-770 - Kaan Altinay, Devris Isler, Zekeriya Erkin
:
Extending Null Embedding for Deep Neural Network (DNN) Watermarking. 771-776 - Alberto De Marchi, Lorenzo Gigli, Andrea Melis, Luca Sciullo, Fabio Vitali:
Supporting Resilient, Ethical, and Verifiable Anonymous Identities Through Blockchains. 777-782

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.