Foundations and Practice of Security : 18th International Symposium, FPS 2025, Brest, France, November 25-27, 2025, Revised Selected Papers, Part II (Lecture Notes in Computer Science)

個数:
  • 予約
  • ポイントキャンペーン

Foundations and Practice of Security : 18th International Symposium, FPS 2025, Brest, France, November 25-27, 2025, Revised Selected Papers, Part II (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032200259

Full Description

This two volume constitutes the refereed proceedings of the 18th International Symposium on Foundations and Practice of Security, FPS 2025, held in Brest, France during November 25-27, 2025.

The 38 full and 8 short papers presented in this book were carefully reviewed and selected from 91 submissions. The papers were organized in the following topical sections:

Part I: Security, Privacy, and Trust in Emerging Distributed Systems; Cyber Resilience and Risk Management in Enterprise Architectures; Formal Methods and Automated Analysis for Secure Software Systems; Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation; Applications to Industry and Critical Infrastructure.
 
Part II: Advances in Privacy-Preserving Cryptography and Secure Computation; Secure and Intelligent Network Architectures for Next-Generation Communications; Secure, Explainable, and Efficient Machine Learning in Cybersecurity; Short Papers.

Contents

.- Advances in Privacy-Preserving Cryptography and Secure Computation.
.- Sender-Efficient Identity-Based Encryption with Reduced Server Trust in the Key Curator Model.
.- Counterfeit Coin Problem Can Be Extended to Secure Multiparty Computation.
.- StrawHat : Private Non-Interactive Gradient Boosting Decision Tree Evaluation Based on Homomorphic Encryption.
.- Scalable privacy-preserving database queries with FHE and PEKS.
.- Secure and Intelligent Network Architectures for Next-Generation Communications.
.- A Fairness-Aware Strategy for B5G Physical-layer Security Leveraging Reconfigurable Intelligent Surfaces.
.- APADV- Anonymous Proactive Distance Vector Routing in Connectivity-Restricted Environments.
.- A secure lightweight system based on device-to-device communication for objects sharing in local communities.
.- Consumer Zero Trust: Towards a Principled Adaptation of Zero Trust for Consumer Networks.
.- Revisiting Network Traffic Analysis: Compatible network flows for ML models.
.- Causal Graph Modeling of Network Traffic for Early Cyberattack Prediction.
.- Secure, Explainable, and Efficient Machine Learning in Cybersecurity.
.- VOLTRON: Detecting Unknown Malware Using Graph-Based Zero-Shot Learning.
.- Deep Learning-Driven Energy Auditing for Smart Grid Cyberattack Detection.
.- Interdependent Privacy in Smart Homes: Hunting for Bystanders in Privacy Policies.
.- QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology.
.- Short Papers.
.- Scaling Blockchains with zk-Rollups: State of the Art and Implementation.
.- COBRA-Z: Collaborative Blockchain Risk Assessment for Zero Trust Architecture.
.- Dynamic Multilayer Information System Cartography for Cybersecurity,Compliance and Industrial Governance: The CARTOGRAPHIT.
.- Energy Consumption of TLS, Searchable Encryption and Fully Homomorphic Encryption.
.- An Embarrassingly Parallel Cryptanalysis of EC(H)MQV.
.- Defending Model Inversion Attack Using an Improved Filter-Based Approach.
.- Verifiability of Unlearning Schemes Through Local Explanation.
.- Anomaly-Aware Aggregation for Robust Peer-to-Peer Machine Learning.

最近チェックした商品