Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part III (Lecture Notes in Computer Science)

個数:
  • 予約

Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part III (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 438 p.
  • 言語 ENG
  • 商品コード 9789819562084

Full Description

The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.

The 79 full papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The papers were organized in the following topical sections:
 
Part I :  Post-Quantum Cryptography; Functional Encryption;  Cryptanalysis and Implementations I; Cryptanalysis and Implementations II.
 
Part II : Secure Multi-party Computation; Anomaly Detection Methodologies & Models;  Network Security & Traffic Analysis.
 
Part III : Privacy Preserving/Enhancing Technologies;  AI and Security I; AI and Security II.

Contents

.- Privacy Preserving/Enhancing Technologies.
.- Homomorphic MaxPooling via Bootstrapping for Privacy-Preserving Neural Networks.
.-  PrivGGM: Private Data Synthesis Using Multivariate Gaussian Generative Models and Fuzzy Rough Sets.
.-  A Framework for Efficient Enhanced Privacy ID from Group Actions.
.- Publicly Verifiable Private Information Retrieval Protocols Based on Function Secret Sharing.
.-  FH-TEE: Single Enclave for all Applications.
.- Comparing and Improving Perturbation Mechanisms under Local Differential Privacy.
.- Anonymous Attribute-based Multi-keyword Searchable Encryption scheme for Medical Data Sharing using Blockchain.
.-  Invisible Data Capsule: Bridging On-Chain and Off-Chain Data Collaboration.
.-  AI and Security I.
.-  DNNKeyLock: Securing Deep Neural Network Intellectual Property with Steganography and Token Authentication.
.-  HBS Algorithmic Database Construction: A Chain-of-Thought-Driven Approach.
.- EGNNFingers: Explainability-Driven Fingerprinting Framework for GNN Ownership Verification.
.- Vertical Federated Convolutional Framework Based on Function Secret Sharing.
.- Transferable Dormant Backdoor : Covertly Embedding Transferable Backdoor via Knowledge Distillation in Pre-trained Models.
.-  Detecting Stealthy Backdoor Attacks in Federated Learning via Wavelet Analysis on Dynamic Dimensions.
.- Backdoor Attacks for Geographic Information Science with Principal Component Analysis and Singular Value Decomposition.
.-  AI and Security II.
.- SeqFuzz : Efficient Kernel Directed Fuzzing via Effective Component Inference.
.-  LLM-DAS: An LLM-Powered Deobfuscation System for ARM Binary Code.
.- Dynamic Generation Method of SELinux Policy Based on Knowledge Graph.
.-  CANalyze-AI: Semantic Zero-Day Detection and Rule Synthesis via LoRA-Fine-Tuned LLM for CAN Security.
.-  FuzzyHawk: Unveiling Ransomware Behavior Patterns via Graph-Based Fuzzy Matching.
.-  SC-HNM:Filtering False Negatives for Network Service Embeddings.
.-  Min-Entropy Estimation for Physical Layer Key Generation: An Empirical Study.
.-  Dual Modal Featuring Scheme for Learning Based Android Malware Prevention.

最近チェックした商品