Information Security : 28th International Conference, ISC 2025, Seoul, South Korea, October 20-22, 2025, Proceedings (Lecture Notes in Computer Science)

個数:

Information Security : 28th International Conference, ISC 2025, Seoul, South Korea, October 20-22, 2025, Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 657 p.
  • 言語 ENG
  • 商品コード 9783032081230

Full Description

The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20-22, 2025.

The 32 full papers presented in these proceedings were carefully reviewed and selected from 77 submissions. The papers are organized in the following topical sections: Cryptanalysis and Cipher Security; Network Security; Post-quantum Cryptography; Side-Channel Attacks and Countermeasures; AI Security; Biometric Security; Malware Analysis; Systems Security; Access Control & Privacy; Smart Contracts and Blockchain Security.

Contents

.-Cryptanalysis and Cipher Security.-Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA.-Keyless Physical-Layer Cryptography.-The Multi-User Security of GCM-SST and Further Enhancements.-Network Security.- SimSeq: A Robust TLS Traffic Classification Method.-EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game Theory.-A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? .-Post-quantum Cryptography.-Conditional Attribute-Based PRE: Definition and Construction from LWE.-LastRings: Lattice-based Scalable Threshold Ring Signatures.-Side-Channel Attacks and Countermeasures.-Simulation-based Software Leakage Evaluation for the RISC-V Platform.-GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect Replacement.-Inference Attacks on Encrypted Online Voting via Traffic Analysis.-Towards Cross-Device Side-Channel Analysis via Domain-Level Attention Mechanisms.-Tighter Bounds for Guessing Entropy in Side-channel Template Attacks.-Collision Spanning Tree: Quick Key Recovery in Side-Channel Collision Attacks.-AI Security.-MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perception.-Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning.-Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images.-Biometric Security.-Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures.-A New Code-Based Formulation of the Fuzzy Vault Scheme.-Malware Analysis.-HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection.-Towards Architecture-Independent Function Call Analysis for IoT Malware.-A Study on Malicious Browser Extensions in 2025.-HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection.-Systems Security
.-A Graph-Based Approach to Alert Contextualisation in Security Operations Centres.-HyperSec: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection.-BootMarker: UEFI Bootkit Defense via Control-Flow Verification.-Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment.-Access Control & Privacy.-CryptNyx: Password-hardened encryption with strong anonymity guarantees.-Efficient Dynamic Group Signatures with Forward Security.-Zero Trust Continuous Authentication Models and Automated Policy Formulation.-Smart Contracts and Blockchain Security.-Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts
.-BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques.

最近チェックした商品