Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Security and Privacy -

Security and Privacy

4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings
Buch | Softcover
XII, 227 Seiten
2025
Springer International Publishing (Verlag)
978-3-032-12833-1 (ISBN)
CHF 104,80 inkl. MwSt
  • Noch nicht erschienen - erscheint am 23.12.2025
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5 7, 2025.

The 14 full papers in this book were carefully reviewed and selected from 52 submissions. They were organized in topical sections as follows: Mathematical Foundation of Cryptography, Authentication Key Management and Machine Learning in Cybersecurity.

.- Mathematical Foundation of Cryptography

.- Design and Implementation of a Cybersecurity-Enhanced In Four-Channel EEG Monitoring System Using Eight Electrodes.
.- Review on the Implications of crystals Kyber in LTE networks.
.- Scalable Dual-Stage Design for Robust Security in WSNs.
.- Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive-Exclusive Properties.
.- Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials.

.- Authentication Key Management

.- Privacy-Preserving Auditable Authentication Scheme for Vehicular Ad-hoc Networks.
.- Fortifying Security: Towards Strong Active Outsider-Resilient CRT-Based Group Key Management.
.- Simulating Multi-Agent Reasoning for Diverse and Adaptive Career Strategies: A Review.

.- Machine Learning in Cybersecurity

.- SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES.
.- Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism.
.- A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models.
.- A Quorum-based Privacy-Preserving Distributed Learning Framework for Anomaly Detection.
.- Hybrid DCGAN-ResNet50 model for Fake Face Detection.
.- Encrypted training using logistic regression with different polynomial approximations of sigmoid function.

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo XII, 227 p. 79 illus., 77 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte broadcast encryption • Communication Efficiency • cryptography • cybersecurity • Deep learning • Distributed Artificial Intelligence • fully homomorphic encryption • group key management • Hybrid Model • machine learning • Mathematical Foundation of Cryptography • post quantum cryptography • privacy enhancing technologies • ring signatures • wireless sensor networks
ISBN-10 3-032-12833-1 / 3032128331
ISBN-13 978-3-032-12833-1 / 9783032128331
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95