Full Description
This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5-7, 2025.
The 14 full papers in this book were carefully reviewed and selected from 52 submissions. They were organized in topical sections as follows: Mathematical Foundation of Cryptography, Authentication Key Management and Machine Learning in Cybersecurity.
Contents
.- Mathematical Foundation of Cryptography
.- Design and Implementation of a Cybersecurity-Enhanced In Four-Channel EEG Monitoring System Using Eight Electrodes.
.- Review on the Implications of crystals Kyber in LTE networks.
.- Scalable Dual-Stage Design for Robust Security in WSNs.
.- Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive-Exclusive Properties.
.- Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials.
.- Authentication Key Management
.- Privacy-Preserving Auditable Authentication Scheme for Vehicular Ad-hoc Networks.
.- Fortifying Security: Towards Strong Active Outsider-Resilient CRT-Based Group Key Management.
.- Simulating Multi-Agent Reasoning for Diverse and Adaptive Career Strategies: A Review.
.- Machine Learning in Cybersecurity
.- SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES.
.- Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism.
.- A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models.
.- A Quorum-based Privacy-Preserving Distributed Learning Framework for Anomaly Detection.
.- Hybrid DCGAN-ResNet50 model for Fake Face Detection.
.- Encrypted training using logistic regression with different polynomial approximations of sigmoid function.



