Muutke küpsiste eelistusi

E-raamat: Security and Privacy in Communication Networks: 21st EAI International Conference, SecureComm 2025, Xiangtan, China, July 4-6, 2025, Proceedings, Part I

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.



The 119 full papers included in these volumes were carefully reviewed and selected from 341 submissions. They are organized in the following topical sections:



Part I: Distributed and Network Security; ML/AI Security.



Part II: ML/AI Security; CyberSecurity.



Part III: CyberSecurity; Cryptography and Authentication.



Part IV: Cryptography and Authentication; Security and Optimization.
.- Distributed and Network Security.


.- A Fault-Tolerant Block Allocation Scheme for Collaborative Storage
Blockchain Systems.


.- A Double-Layer Blockchain-Assisted Anonymous Cross-Domain Authentication
and Transaction Scheme for Metaverse.


.- Adaptive On-Chain and Off-Chain Communication Management Based on SDN and
Blockchain.


.- BDSV: A Blockchain-based Reliable and Efficient Batch Digital Signature
Verification Scheme for IoV.


.- BFT-MS: Asynchronous BFT Protocol Using Bounded Memory.


.- Fair Exchange of Trained Machine Learning Models Based on Permissioned
Blockchain and Zero-Knowledge Contingent Payment.


.- SaFeBridge: Consensus-Agnostic Asset Transfer with Slow-Approval Fast-Exit
Principles.


.- Security Detection Method for Wireless Sensor Networks Based on
Self-Supervised Learning and Deep Learning.


.- Securing Snapshot Pruning in IOTA Tangle 2.0: A Cooperative Deep
Reinforcement Learning Approach for Edge-Cloud Smart Meter Networks.


.- TACA: Blockchain-Based Traceable and Anonymous Cross-Domain Authentication
Scheme for IIoT.


.- Spatiotemporal Cross-Domain Integrated Insights: Mitigating Fraudulent
Activities on Ethereum.


.- PIRchain: Blockchain-Enhanced Privacy-Preserving Inter-domain Routing.


.- Consortium Blockchain-Based Anti-Plagiarism Scheme for Multi-NFT
Marketplaces.


.- Cryptocurrency Transaction Anomaly Detection Based on Semi-Supervised
Learning and Graph Neural Network.


.- Hardware-assisted Secure Decentralized Cloud Storage via Self-audit and
Self-repair.


.- RdBFT: Faster Asynchronous BFT Protocol through Random Binary Agreement.


.- Antitoxin: A Framework for Controlling Persistent Backdoors in Federated
Learning.


.- MDC-Net:Multi-Dimensional Cross-Domain Collaborative Network for Image
Manipulation Localization.


.- The Framework Of Variational Mode Decomposition Based For DDoS Detection.


.- DCAPSCR: A Decentralized Conditional Anonymous Payment System With
Collaborative Regulation.


.- SCFA: Stacked Classifier with Feature Augmentation for Imbalanced Node
Classification in Intelligent Internet-of Things.


.- ML/AI Security.


.- FL(DP)2 : Federated Learning with Dynamic Personalized Differential
Privacy.


.- FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT
Intrusion Detection.


.- Knowledge Distillation for Federated Learning with Many Noisy Clients.


.- Low Energy Consumption Hierarchical Federated Learning.


.- LPFL-RL: A Lightweight Privacy-Preserving Federated Learning Scheme with
Robustness Against Low-Quality Users in Cloud-Edge Collaborative
Environments.


.- Heterogeneity-aware semi-asynchronous federated learning.


.- pFedDDS: Personalized Federated Learning via Dual defense Strategies.


.- PPCM-Fed: Privacy-Preserving Cross-Modal Federated Learning in IoT.


.- Security-Aware and Energy-Efficient Federated Learning in LEO Satellite
Edge Micro-clouds: A Noise-Adaptive Allocation Framework.