Information Security Practice and Experience : 20th International Conference, ISPEC 2025, Chengdu, China, November 7-9, 2025, Proceedings (Lecture Notes in Computer Science)

  • 予約

Information Security Practice and Experience : 20th International Conference, ISPEC 2025, Chengdu, China, November 7-9, 2025, Proceedings (Lecture Notes in Computer Science)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 470 p.
  • 言語 ENG
  • 商品コード 9789819592838

Full Description

This book constitutes the refereed proceedings of the 20th International Conference on Information Security Practice and Experience, ISPEC 2025, held in Chengdu, China, during November 7-9, 2025. 

The 27 full papers and 8 short papers included in these volumes were carefully reviewed and selected from 72 submissions. They are organized in the following topical sections: Federated Learning; Cryptography and Security Protocols; Cybersecurity and Intrusion Detection; Multimedia Security and Side-Channel Attacks; Privacy Protection and AI Security.

Contents

.- Federated Learning.

.- Secure Aggregation Scheme for Federated Learning with Bilateral Verification in the Internet of Vehicles.

.- A Personalized Federated Matrix Decomposition Recommendation Algorithm Based on Meta-Distillation.

.- Critical Neuron-Based Backdoor Defense for Federated Learning: A Combined Dropout and Local Outlier Factor Approach.

.- A Study on Free-Rider Detection Mechanism for a Fair Federated Learning-Based Intrusion Detection System.

.- A Reputation-Based Dynamic Aggregation Node Selection Method for Federated Learning.

.- Cryptography and Security Protocols.

.- Publicly Verifiable Multi-server Homomorphic Secret Sharing.

.- Meet-in-the-Middle Preimage Attacks with Multi-Match on ASCON-XOF.

.- Mixderive A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha.

.- A New Cryptanalytic Technique on Bit-Oriented Stream Ciphers and Application to ACORN v3.

.- A novel S-box construction technique based on the improved genetic algo-rithms through 2N-round searching.

.- Towards a Lattice-Based Non-Interactive Aggregate Signature Scheme Following the Fiat-Shamir with Aborts Paradigm.

.- Distributed Key Generation for SM2 and Its Applications to Threshold Encryption.

.- Cybersecurity and Intrusion Detection.

.- Zero-recollecting Mobile-app Identification over Drifted Encrypted Network Traffic.

.- An RPKI Certificate Validator for Formal Correctness.

.- Secure and Efficient File De-Duplication in Cloud Storage Using Checksums.

.- Blockchain-Based Real Estate Contract Authentication System for the Ejar Platform.

.- Traceable Multi-signature Scheme with Distributed Combiners and Lightweight Setup for Accountable Blockchain Transactions.

.- APT Attack Detection with Heterogeneous Provenance Graph and Adversarial Knowledge of Tactics, Techniques, and Procedures.

.- Multimedia Security and Side-Channel Attacks.

.- Research on image-based vulnerability detection of embedded firmware.

.- Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN.

.- Research on Video Steganography Based on Optical Flow Perception and Discrete Wavelet Transform.

.- Self-Supervised CNN for Video Double Compression Detection via Artifact Prediction.

.- Privacy Protection and AI Security.

.- Adversarial Defense via Clean-Sample Guided Adaptive Overlapping Patch for Traffic Sign Recognition Systems.

.- NIDS-GPT :A new GPT-based model for anomaly data package detection.

.- Authenticated and Incremental Single-Server Private Information Retrieval.

.- A Fully Anonymous Authentication Scheme with Cryptographic Reverse Firewalls in Vehicle-to-Grid Networks.

.- Enhancing FIDO2 Authentication Security through Markov Decision Process-Based Risk Assessment.

.- Assessing the Security of Vibe Coding: Baseline vs. Security-Oriented Prompts in LLM Code Generation.

最近チェックした商品