Security and Privacy
Springer International Publishing (Verlag)
978-3-032-12833-1 (ISBN)
- Noch nicht erschienen - erscheint am 23.12.2025
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5 7, 2025.
The 14 full papers in this book were carefully reviewed and selected from 52 submissions. They were organized in topical sections as follows: Mathematical Foundation of Cryptography, Authentication Key Management and Machine Learning in Cybersecurity.
.- Mathematical Foundation of Cryptography
.- Design and Implementation of a Cybersecurity-Enhanced In Four-Channel EEG Monitoring System Using Eight Electrodes.
.- Review on the Implications of crystals Kyber in LTE networks.
.- Scalable Dual-Stage Design for Robust Security in WSNs.
.- Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive-Exclusive Properties.
.- Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials.
.- Authentication Key Management
.- Privacy-Preserving Auditable Authentication Scheme for Vehicular Ad-hoc Networks.
.- Fortifying Security: Towards Strong Active Outsider-Resilient CRT-Based Group Key Management.
.- Simulating Multi-Agent Reasoning for Diverse and Adaptive Career Strategies: A Review.
.- Machine Learning in Cybersecurity
.- SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES.
.- Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism.
.- A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models.
.- A Quorum-based Privacy-Preserving Distributed Learning Framework for Anomaly Detection.
.- Hybrid DCGAN-ResNet50 model for Fake Face Detection.
.- Encrypted training using logistic regression with different polynomial approximations of sigmoid function.
| Erscheinungsdatum | 02.12.2025 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XII, 227 p. 79 illus., 77 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | broadcast encryption • Communication Efficiency • cryptography • cybersecurity • Deep learning • Distributed Artificial Intelligence • fully homomorphic encryption • group key management • Hybrid Model • machine learning • Mathematical Foundation of Cryptography • post quantum cryptography • privacy enhancing technologies • ring signatures • wireless sensor networks |
| ISBN-10 | 3-032-12833-1 / 3032128331 |
| ISBN-13 | 978-3-032-12833-1 / 9783032128331 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich