Vai al contenuto principale della pagina

Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part III / / edited by Rongmao Chen, Robert H. Deng, Moti Yung



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Chen Rongmao Visualizza persona
Titolo: Information Security and Cryptology : 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part III / / edited by Rongmao Chen, Robert H. Deng, Moti Yung Visualizza cluster
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026
Edizione: 1st ed. 2026.
Descrizione fisica: 1 online resource (716 pages)
Disciplina: 005.8
Soggetto topico: Data protection
Image processing - Digital techniques
Computer vision
Computer networks
Application software
Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Data and Information Security
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Communication Networks
Computer and Information Systems Applications
Mobile and Network Security
Cryptology
Altri autori: DengRobert H  
YungMoti  
Nota di contenuto: -- Privacy Preserving/Enhancing Technologies. -- Homomorphic MaxPooling via Bootstrapping for Privacy-Preserving Neural Networks. -- PrivGGM: Private Data Synthesis Using Multivariate Gaussian Generative Models and Fuzzy Rough Sets. -- A Framework for Efficient Enhanced Privacy ID from Group Actions. -- Publicly Verifiable Private Information Retrieval Protocols Based on Function Secret Sharing. -- FH-TEE: Single Enclave for all Applications. -- Comparing and Improving Perturbation Mechanisms under Local Differential Privacy. -- Anonymous Attribute-based Multi-keyword Searchable Encryption scheme for Medical Data Sharing using Blockchain. -- Invisible Data Capsule: Bridging On-Chain and Off-Chain Data Collaboration. -- AI and Security I. -- DNNKeyLock: Securing Deep Neural Network Intellectual Property with Steganography and Token Authentication. -- HBS Algorithmic Database Construction: A Chain-of-Thought-Driven Approach. -- EGNNFingers: Explainability-Driven Fingerprinting Framework for GNN Ownership Verification. -- Vertical Federated Convolutional Framework Based on Function Secret Sharing. -- Transferable Dormant Backdoor : Covertly Embedding Transferable Backdoor via Knowledge Distillation in Pre-trained Models. -- Detecting Stealthy Backdoor Attacks in Federated Learning via Wavelet Analysis on Dynamic Dimensions. -- Backdoor Attacks for Geographic Information Science with Principal Component Analysis and Singular Value Decomposition. -- AI and Security II. -- SeqFuzz : Efficient Kernel Directed Fuzzing via Effective Component Inference. -- LLM-DAS: An LLM-Powered Deobfuscation System for ARM Binary Code. -- Dynamic Generation Method of SELinux Policy Based on Knowledge Graph. -- CANalyze-AI: Semantic Zero-Day Detection and Rule Synthesis via LoRA-Fine-Tuned LLM for CAN Security. -- FuzzyHawk: Unveiling Ransomware Behavior Patterns via Graph-Based Fuzzy Matching. -- SC-HNM:Filtering False Negatives for Network Service Embeddings. -- Min-Entropy Estimation for Physical Layer Key Generation: An Empirical Study. -- Dual Modal Featuring Scheme for Learning Based Android Malware Prevention.
Sommario/riassunto: The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025. The 79 full papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The papers were organized in the following topical sections: Part I : Post-Quantum Cryptography; Functional Encryption; Cryptanalysis and Implementations I; Cryptanalysis and Implementations II. Part II : Secure Multi-party Computation; Anomaly Detection Methodologies & Models; Network Security & Traffic Analysis. Part III : Privacy Preserving/Enhancing Technologies; AI and Security I; AI and Security II.
Titolo autorizzato: Information Security and Cryptology  Visualizza cluster
ISBN: 981-9562-09-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996696878403316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Computer Science, . 1611-3349 ; ; 16410