Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II (Lecture Notes in Computer Science)

個数:
  • 予約

Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 434 p.
  • 言語 ENG
  • 商品コード 9789819562022

Full Description

The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.

The 79 full papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The papers were organized in the following topical sections:
 
Part I :  Post-Quantum Cryptography; Functional Encryption;  Cryptanalysis and Implementations I; Cryptanalysis and Implementations II.
 
Part II : Secure Multi-party Computation; Anomaly Detection Methodologies & Models;  Network Security & Traffic Analysis.
 
Part III : Privacy Preserving/Enhancing Technologies;  AI and Security I; AI and Security II.

Contents

.- Secure Multi-party Computation.
.- Quantum-Computation Classical-Communication Commitments from SZK-Hardness.
.-  Concretely Efficient Constructions for Differentially Private Set Intersection.
.-  MSFS: Maliciously Secure 3-Party Feature Selection via Mutual Information.
.- Adaptive Batched K-out-of-N Oblivious Transfers Extension.
.-  Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints.
.- Anomaly Detection Methodologies & Models.
.-  Anomaly Detection for ADS-B Data Based on KAN-LSTM.
.- Network Intrusion Detection Method Based on Multi-Scale Feature Clustering and Improved Honey Badger Algorithm.
.-  SAGE: Spatiotemporal Feature Fusion for Anomaly Detection in Multivariate Time Series.
.-  MoE-CNN with Dynamic Feature Selection and CSAM for Network Anomaly Detection.
.-  PP-MTAD: Privacy-Preserving and Efficient Multivariate Time Series Anomaly Detection.
.-  LogWhisperer: Multi-Log Semantic Similarity Analysis based Intelligent Vehicle Anomaly Detection without Log Template.
.-  An Early Detection of Risky Crowd Dynamics Scheme Based on Motion Entropy and Scene Semantics.
.-  Enhancing Explainability in X-IDS through Counterfactuals.
.-  What Interferes with the Accurate Detection of Origin Hijacking Anomalies?.
.-  Network Security & Traffic Analysis.
.-  Verifiable and Privacy-Preserving Deep Packet Inspection for Multiple Rule Service Providers.
.- Towards Adaptive Network Defense: A Self-Evolving Threat Detection Framework.
.-  Early Detection of Malicious Traffic based on Graph Modeling and Spatio-Temporal Attention Approach.
.- Revealing the Frailty of Static Benchmarks: The DyNA-IDS Framework for Concept Drift Adaptation in Time-Series Network Intrusion Detection.
.-  iSSH: Enabling In-Flight SSH Traffic Inspection without Key Escrow.
.-  Tracing Your Roots: Exploring the Security Issues of Root Certificates in Android TLS Connections.
.- Exploring the Root Store Usage in TLS-based Applications.
.-  LSDBFT: A Loose DAG-based Asynchronous BFT Consensus Algorithm with Fair Ordering.
.-  FRanCS: A Fair and Randomized Anonymous Network Circuit Selection Mechanism with Blockchain.
.- Robust Training of Efficient Traffic Classifier with Noisy Labels.
.-  A Multimodal Asynchronous Federated Learning Approach for Encrypted Traffic Classification.

最近チェックした商品