Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

個数:
  • 予約

Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032234551

Full Description

This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.

The 119 full papers included in these volumes were carefully reviewed and selected from 341 submissions. They are organized in the following topical sections:

Part I: Distributed and Network Security; ML/AI Security.

Part II: ML/AI Security; CyberSecurity.

Part III: CyberSecurity; Cryptography and Authentication.

Part IV: Cryptography and Authentication; Security and Optimization.

Contents

.- Cryptography and Authentication.

.- Optimized Entanglement Routing for Enhanced Quantum Key Distribution Performance in Quantum Networks.

.- Att-SFI: Attestable software sandboxing with control flow integrity.

.- A Blockchain-based Four-factor Authentication and Key Agreement Protocol for Wireless Medical Sensor Networks.

.- A Re-authentication Scheme based on Blockchain and Reinforcement Learning.

.- Security and Optimization.

.- A Hybrid Adaptive Large Neighborhood Search for Secure and Efficient Single School Routing Problem.

.- A Loop Elimination Method Based on Vector DSP Processor with Immediate Addressing Incorporation.

.- A Maximizing Duty-Cycle network Lifetime Cooperative Routing algorithm in a Smart Community Scenario.

.- A Safety-Optimized Two-Stage Algorithm for Rural School Bus Route Planning with Heterogeneous Fleets and Mixed Loads.

.- An Energy-Aware Scheduling Algorithm for Multi-period Parallel Applications on Heterogeneous Systems.

.- DF TransNet: Dual-channel Fusion Transformer for Image Deraining.

.- DRLPO: A Deep Reinforcement Learning Distributed Partial Offloading Scheme for Fog Computing Networks.

.- BMI: A Bidirectional Spatio-Temporal Selective State Space Model for Data Imputation.

.- Multi-Dimensional Cost-Driven LDSP Instruction Scheduling Optimization.

.- More Bang for Your Buck: Gaining Collateral Benefit from Partial ROV Deployment.

.- On Analyzing SSO Permissions Across Web and Android Platforms.

.- Replication-Based Fault-Tolerant Scheduling Algorithm for Heterogeneous Real-Time Systems.

.- Research on Mixed-precision Optimization Compilation Methods for Loop Programs.

.- ReForGe: A Fusion Model with Recursive Feature Engineering for PdM of Aircraft Engines.

.- Real-World Image Dehazing via Degradation Modeling, Spectral-Spatial Fusion, and Prior Guidance.

.- The Decision of Monotonic Automata.

.- A Self-adaptive Moving Target Defense Decision-making Method Based on Bounded-rationality Supermodular Games.

.- Investigating How Trading Patterns and Twitter Impact the CryptoPunks NFT Market.

.- A Cyber Threat Intelligence Entity Relation ExtractionMethod Based on Improved OneRel Model.

.- Dependency Tree-based Multi-Task Learning for Extracting Process Models in Safety Management.

.- Joint Beamforming and Reflection Design for Physical Layer Security in RIS-Assisted Integrated Sensing and Communication Systems.

.- OptiGame: Game-Theoretic Enhancements for Optimistic Rollups through Bayesian Strategies.

.- CCGCRN: Cluster and Completion Graph Convolution Recurrent Network for Incomplete Traffic Flow Forecasting.

.- AquaCrossNet: An Underwater Cross-Granularity Complementary Segmentation Network.

.- When VR is Not Just for Gaming: Unmasking GPU Resource Misuse on VR Headset.

最近チェックした商品