Muutke küpsiste eelistusi

E-raamat: Cyberspace Safety and Security: 15th International Symposium, CSS 2025, Hangzhou, China, July 4-7, 2025, Proceedings

Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, held in Hangzhou, China, on February 24, 2025.

The 28 full papers were presented in this volume were carefully reviewed and selected from 112 submissions. This conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

.- Dynamic spectrum sharing scheme for anti-malicious user's queries based on blockchain.

.- Internet of Vehicle Privacy Protection Solution Based on Blockchain and Zero Knowledge Proof.

.- A New Asymmetric Three-Party Key Agreement Protocol Based on Secure Multiparty Computation.

.- TCAu:Time-Controllable Air-Space-Ground Authentication.

.- A NIZK-Based Linkable Ring Signature Scheme for Anonymous Blockchain System on Lattice.

.- CP-ABZP: A CP-ABE Cross-chain Privacy Protection Scheme Combined with Zero-Knowledge Proof.

.- A Novel Dual-layer Access Control Model based on Blockchain for the Case-involved Property Management.

.- MUSES: Secure Multi-User Encrypted Speech Search in Cloud-Edge-End Environments.

.- Efficient Group Key Management for Vehicle Ad Hoc Networks.

.- Privacy-Preserving Machine Learning Using Functional Encryptions for Multiple Models with Constant Ciphertext.

.- A Privacy-preserving Delegable Auditing Scheme with Edge-assisted Deduplication in IoT.

.- A Multi-KGC Certificateless Anonymous Cloud Sharing Scheme with Threshold-based Traceability.

.- A Differential Privacy Approach to Optimization for Protecting Large Models.

.- Unifying Physical-Layer Security and Post-Quantum Cryptography: An Optimized Authentication Encryption Protocol.

.- Anonymous Batch Authentication and Key Agreement for Internet of Things.

.- A lightweight Privacy-Preserving kNN Query Framework via Secret Sharing in Cloud Computing.

.- BiLSTMTimeGAN: Enhancing Side-Channel Attacks through Temporal Data Augmentation.

.- An encrypted anomaly traffic detection method integrating adversarial training and multi-scale contrastive learning.

.- MGtest: Python Coverage-Guided Model-Level Fuzzing for DL frameworks.

.- Collaborative Physical Layer Authentication for Vehicular Networks based on Dempster-Shafer Evidence Theory.

.- A Survey of Kernel Fuzzing.

.- Federated Learning against Dynamic Mixed Poisoning Attack and its Defense.

.- Robust Fake Image Detection via Incremental Training of Siamese Neural Networks.

.- Advancing Deepfake Detection through Head Pose Estimation on New-Generation Datasets.

.- A Verifiable and Privacy-Preserving Credit Risk Prediction under Secure Neural Network Scheme.

.- Security Assessment in Optical Networks: A Path Graph-based Framework for Attack-Induced Fault Diagnosis.

.- Machine Learning Model Construction and Multi-Dimensional Evaluation for Pop-up Text Sentiment Analysis.

.- Enhancing Double Ratchet Algorithm with Pre-Shared Key Mechanism and Optimal KDF Selection.