Information and Communications Security : 27th International Conference, ICICS 2025, Nanjing, China, October 29-31, 2025, Proceedings, Part I (Lecture Notes in Computer Science)

個数:
  • 予約

Information and Communications Security : 27th International Conference, ICICS 2025, Nanjing, China, October 29-31, 2025, Proceedings, Part I (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 574 p.
  • 言語 ENG
  • 商品コード 9789819535392

Full Description

This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29-31, 2025.

The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections:

Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization.

Part II: Blockchain and Cryptocurrencies, System and Network Security, Security and Privacy of AI, Machine Learning for Security.

Part III: Attack and Defense; Vulnerability Analysis; Anomaly Detection; Traffic Classification; Steganography and Watermarking.

Contents

.- Cryptography.

.- Multi-Signer Locally Verifiable Aggregate Signature from (Leveled) Multilinear Maps.

.- Conditional Attribute-based Encryption with Keyword Search for Pay-Per-Query Commercial Model.

.- Lightweight Transparent Zero-Knowledge Proofs for Cross-Domain Statements.

.- Public Verifiable Server-Aided Revocable Attribute-Based Encryption.

.- New First-Order Secure AES Implementation without Online Fresh Randomness Records.

.- SM2-VBKE: Achieving Cryptographic Binding Between Verification Integrity and Key Generation.

.- Certificate-Based Quasi-Linearly Homomorphic Signatures: Definition, Construction, and Application to Data Integrity Auditing.

.- Zero-Knowledge Protocols with PVC Security: Striking the Balance between Security and Efficiency.

.- Attribute-Based Adaptor Signature and Application in Control-based Atomic Swap.

.- A Versatile Decentralized Attribute Based Signature Scheme for IoT.

.- Post-quantum Cryptography.

.- Cross-Domain Lattice-based DAA Scheme with Shared Private-Key for Internet of Things System.

.- Compact Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors.

.- MDKG: Module-lattice-based Distributed Key Generation.

.- Turtle Wins Rabbit Again: Faster Modulus Reduction for RNS-CKKS.

.- A BGV-subroutinted CKKS Bootstrapping Algorithm without Sine Approximation.

.- PolarKyber: Polished Kyber with Smaller Ciphertexts, Greater Security Redundancy, and Lower Decryption Failure Rate.

.- Lion: A New Ring Signature Construction from Lattice Gadget.

.- Anonymity and Privacy.

.- MagWatch: Exposing Privacy Risks in Smartwatches through Electromagnetic Signals.

.- Privacy-preserving, Secure and Certificate-based Integrity Auditing for Cloud Storage.

.- Unbalanced Private Computation on Set Intersection with Reduced Computation and Communication.

.- Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories.

.- Privacy-preserving Framework for k-modes Clustering Based on Personalized Local Differential Privacy.

.- AnoST: An Anonymous Optimistic Verification System Based on Off-Chain State Transition.

.- Privacy-Preserving K-hop Shortest Path Query on Encrypted Graphs Based on Graph Pruning.

.- TA-PDC: Provable Data Contribution with Traceable Anonymous for Group Transactions.

.- Fine-filter: An Effective Defense against Poisoning Attacks on Frequency Estimation under LDP.

.- BioVite: Efficient and Compact Privacy-Preserving Biometric Verification via Fully Homomorphic Encryption.

.- Authentication and Authorization.

.- Circulation Control Model and Administration for Geospatial Data.

.- Identifying Unusual Personal Data in Mobile Apps for Better Privacy Compliance Check.

.- Why Biting the Bait? Understanding Bait and Switch UI Dark Patterns in Mobile Apps.

最近チェックした商品