My Account Log in

1 option

Security and Privacy : 4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings / edited by Sihem Mesnager, Pantelimon Stănică, Kamalesh Acharya, Sumit Kumar Debnath.

Springer Nature - Springer Computer Science eBooks 2026 English International Available online

View online
Format:
Book
Author/Creator:
Mesnager, Sihem.
Series:
Communications in Computer and Information Science, 1865-0937 ; 2799
Language:
English
Subjects (All):
Data protection.
Computer networks.
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Application software.
Data and Information Security.
Computer Communication Networks.
Cryptology.
Mobile and Network Security.
Security Services.
Computer and Information Systems Applications.
Local Subjects:
Data and Information Security.
Computer Communication Networks.
Cryptology.
Mobile and Network Security.
Security Services.
Computer and Information Systems Applications.
Physical Description:
1 online resource (330 pages)
Edition:
1st ed. 2026.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2026.
Summary:
This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025, held in Rourkela, India, during December 5–7, 2025. The 14 full papers in this book were carefully reviewed and selected from 52 submissions. They were organized in topical sections as follows: Mathematical Foundation of Cryptography, Authentication Key Management and Machine Learning in Cybersecurity.
Contents:
Mathematical Foundation of Cryptography
Design and Implementation of a Cybersecurity-Enhanced In Four-Channel EEG Monitoring System Using Eight Electrodes.
Review on the Implications of crystals Kyber in LTE networks.
Scalable Dual-Stage Design for Robust Security in WSNs.
Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive-Exclusive Properties.
Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials.
Authentication Key Management
Privacy-Preserving Auditable Authentication Scheme for Vehicular Ad-hoc Networks.
Fortifying Security: Towards Strong Active Outsider-Resilient CRT-Based Group Key Management.
Simulating Multi-Agent Reasoning for Diverse and Adaptive Career Strategies: A Review.
Machine Learning in Cybersecurity
SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES.
Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism.
A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models.
A Quorum-based Privacy-Preserving Distributed Learning Framework for Anomaly Detection.
Hybrid DCGAN-ResNet50 model for Fake Face Detection.
Encrypted training using logistic regression with different polynomial approximations of sigmoid function.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
3-032-12834-X
9783032128348
OCLC:
1564849202

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account