Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

個数:
  • 予約

Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032234520

Full Description

This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.

The 119 full papers included in these volumes were carefully reviewed and selected from 341 submissions. They are organized in the following topical sections:

Part I: Distributed and Network Security; ML/AI Security.

Part II: ML/AI Security; CyberSecurity.

Part III: CyberSecurity; Cryptography and Authentication.

Part IV: Cryptography and Authentication; Security and Optimization.

Contents

.- CyberSecurity.

.- XRwatcher: A Detection Scheme for XR Privacy Speculation Attacks Based on Traffic Analysis.

.- Causal-Driven Multi-Objective Grey Wolf Optimization Framework for Multidimensional Redundant IoT Traffic Intrusion Detection.

.- Comprehensive Commits Security Testing with Enhanced Multi-Target Directed Fuzzing.

.- FlipStress: Noise Injection Defenses Against CPU-cache-based Web Attacks.

.- Clark: a Transferable APT Detection Framework via Self-Supervised Contrastive Learning.

.- Document Image Tampering Detection based on Multi-domain Feature Consistency.

.- CLATM: A Contrastive Learning-Based FDIA Detection Method with Attention Timestamp Masking for REIoT.

.- Prompting Large Language Models for Data-Flow Analysis: Addressing Common Errors for Better Reasoning.

.- SG-SCA: An Interpretable Side-Channel Analysis Model Based on Shapelet and Graph Attention Network.

.- RADBench: A Comprehensive Benchmark for Internet Routing Anomaly Detection.

.- Complementary Ensemble Empirical Mode Decomposition and Permutation Entropy-Empowered Network Traffic Anomaly Detection for Secure QUIC Communications.

.- Cryptography and Authentication.

.- A lightweight authentication protocol for resource constrained WBAN.

.- A Novel Multi-Graph Spatial-Temporal Graph Neural Network Model for Traffic Prediction.

.- A Social-Relationship and Geospatial-Aware Incentive Mechanism for Privacy-Preserving Mobile Crowdsensing.

.- An Intrusion Detection-Based Location Privacy Protection Algorithm for VANETs.

.- DASPN: A Multi-level Security Protection Model for Northbound Interface Based on Dynamic Access Control.

.- Decentralized Role Rotation Privacy Protection in Federated Learning.

.- ECC-Based Certificate-less Aggregate Signatures Scheme for VANETs.

.- Efficient Privacy-Preserving and Verifiable Arbitrary Polygon Range Query in Cloud Computing.

.- ESKNN:Efficient Secure KNN Query Based On 3-Party Secure Computation.

.- Privacy-Enhanced Multi-Modal Feature Fusion for E Commerce: A Novel Approach to Image and Text Retrieval.

.- Privacy-preserving Preselection for Face Identification Based on Packing.

.- Privacy-Preserving Probability Fingerprinting Scheme with Collusion Resistance for Relational Databases.

.- Protecting Medical Image Privacy by Using Chaos Encryption and Blockchain.

.- Revocable and Verifiable Key Aggregate Searchable Encryption for Flexible Data Sharing.

.- SAFE: A Fast Privacy-Preserving Scheme for Multi-Client Face Verification.

.- Unbalanced Secret Labeled Private Set Intersection via Scalable Dual-Load Bloom Filter.

.- Dynamic Dual-Anonymous Lightweight Certificateless Authentication Protocol for Social IoT-Assisted V2G.

.- HIDE: Anonymous Hop-by-Hop Identity Authentication Based on Dynamic Address Label Embedding.

.- Now Let's Make It Physical! Enabling Trusted Certificate Issuance in PKI via Physical Bindings for CAs.

最近チェックした商品