This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5 7, 2025. The 14 full papers in this book were carefully reviewed and selected from 52 submissions. They were organized in topical sections as follows: Mathematical Foundation of Cryptography, Authentication Key Management and Machine Learning in Cybersecurity.
This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5 7, 2025.
The 14 full papers in this book were carefully reviewed and selected from 52 submissions. They were organized in topical sections as follows: Mathematical Foundation of Cryptography, Authentication Key Management and Machine Learning in Cybersecurity.
Produktdetails
Produktdetails
Communications in Computer and Information Science 2799
. Mathematical Foundation of Cryptography . Design and Implementation of a Cybersecurity Enhanced In Four Channel EEG Monitoring System Using Eight Electrodes. . Review on the Implications of crystals Kyber in LTE networks. . Scalable Dual Stage Design for Robust Security in WSNs. . Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive Exclusive Properties. . Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials. . Authentication Key Management . Privacy Preserving Auditable Authentication Scheme for Vehicular Ad hoc Networks. . Fortifying Security: Towards Strong Active Outsider Resilient CRT Based Group Key Management. . Simulating Multi Agent Reasoning for Diverse and Adaptive Career Strategies: A Review. . Machine Learning in Cybersecurity . SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES. . Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism. . A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models. . A Quorum based Privacy Preserving Distributed Learning Framework for Anomaly Detection. . Hybrid DCGAN ResNet50 model for Fake Face Detection. . Encrypted training using logistic regression with different polynomial approximations of sigmoid function.
. Mathematical Foundation of Cryptography . Design and Implementation of a Cybersecurity Enhanced In Four Channel EEG Monitoring System Using Eight Electrodes. . Review on the Implications of crystals Kyber in LTE networks. . Scalable Dual Stage Design for Robust Security in WSNs. . Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive Exclusive Properties. . Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials. . Authentication Key Management . Privacy Preserving Auditable Authentication Scheme for Vehicular Ad hoc Networks. . Fortifying Security: Towards Strong Active Outsider Resilient CRT Based Group Key Management. . Simulating Multi Agent Reasoning for Diverse and Adaptive Career Strategies: A Review. . Machine Learning in Cybersecurity . SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES. . Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism. . A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models. . A Quorum based Privacy Preserving Distributed Learning Framework for Anomaly Detection. . Hybrid DCGAN ResNet50 model for Fake Face Detection. . Encrypted training using logistic regression with different polynomial approximations of sigmoid function.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826