- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The CCIS 2805, constitutes the refereed proceedings of the 8th International Conference on Frontiers in Cyber Security, FCS 2025 held in Guiyang, China, October 24-26, 2025, Proceedings.
The 31 full papers included in this book were carefully reviewed and selected from 75 submissions.
Contents
.-Applied Cryptography.
.- Threshold Signature-Based Roaming Framework Leveraging Blockchain Systems.
.-Strategic Analysis of 51% Attack in Mining Pools via Repeated Games.
.- A Quantum-Resistant Authentication Protocol for Power IoT Networks.
.- Verifiable Multi-level Delegatable Attribute-Based Proxy Re-encryption Scheme for Cloud Computing.
.- A Lattice-based Designated Verifier Signcryption Scheme.
.- A Lattice Based IBE Scheme for Automatic Key Update.
.- Multimedia Security and Application.
.- Temporal Knowledge Graph Representation Learning with Evolutional Representation and Attention Mechanism.
.- A Robust Audio Watermarking Algorithm Based on Adaptive Quantization Strategy and Feature Classification.
.-Temporal Knowledge Graph Reasoning Based on Path-aware Temporal Gating.
.-Multimodal Fake News Detection via Evidence Retrieval with Vision-Language Model.
.-Security Analysis of LWE/RLWE-based Diffie-Hellman-like Post-quantum Authenticated Key Exchange Protocols in the eCK Model.
.-MD-GCN: Multi-view Dependency-enhanced Graph Convolutional Network for Aspect-based Sentiment Analysis.
.- A Cloud Resource Scheduling Approach Based on Deep Reinforcement Learning.
.- AI Security.
.-Certificateless Offline/Online Signcryption for Lightweight Anonymous Authentication in VANETs.
.-A Multi-Modal Data Recommendation Model Based on CNN.
.-Handwritten Signature Verification based on Multimodal Fusion with Global Features.
.-A Quantum-Secure Certiffcateless Aggregate Signature Scheme for Emergency Communication.
.-Cross-Sample Inconsistency-Based Video Forgery Detection Using Graph Convolutional Networks.
.-Watermarking Quantum Neural Networks Based on Sample Grouped and Paired Training.
.-SPHINCS+ Based Certiffcation Scheme for Federated Learning Client Models.
.-Research on Integrated Adversarial Attack and Defense Method for Object Detection Models.
.-Privacy Protection.
.-Conditional Privacy-Preserving Authentication Scheme Using Anonymous Credentials.
.-T-DAC: Time-Driven Access-Controlled Cryptography for Streaming Data.
.-Privacy-Protected Classification of Sensitive Personal Information.
.-An Authenticated Certificateless Public Key Searchable Encryption Scheme.
.-Federated Learning Backdoor Attack Using Dynamic Parameter Adjustment and Collaborative Trigger Optimization.
.-Multi-UAV Task Scheduling Optimization Based on the Improved Genetic Algorithm.
.-Data Integrity Auditing Supporting Multi-Ownership Transfer in Cloud Storage.
.- Incentive-Driven Zero-Knowledge Proof-based.
-
- 洋書電子書籍
- Subjects, Citizens …
-
- 洋書電子書籍
-
免疫測定法ハンドブック(第4版)



