Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II

Author:   Rongmao Chen ,  Robert H. Deng ,  Moti Yung
Publisher:   Springer Verlag, Singapore
ISBN:  

9789819562022


Pages:   480
Publication Date:   04 February 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $211.17 Quantity:  
Pre-Order

Share |

Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II


Overview

Full Product Details

Author:   Rongmao Chen ,  Robert H. Deng ,  Moti Yung
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
ISBN:  

9789819562022


ISBN 10:   9819562023
Pages:   480
Publication Date:   04 February 2026
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Secure Multi-party Computation. .- Quantum-Computation Classical-Communication Commitments from SZK-Hardness. .-  Concretely Efficient Constructions for Differentially Private Set Intersection. .-  MSFS: Maliciously Secure 3-Party Feature Selection via Mutual Information. .- Adaptive Batched K-out-of-N Oblivious Transfers Extension. .-  Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints. .- Anomaly Detection Methodologies & Models. .-  Anomaly Detection for ADS-B Data Based on KAN-LSTM. .- Network Intrusion Detection Method Based on Multi-Scale Feature Clustering and Improved Honey Badger Algorithm. .-  SAGE: Spatiotemporal Feature Fusion for Anomaly Detection in Multivariate Time Series. .-  MoE-CNN with Dynamic Feature Selection and CSAM for Network Anomaly Detection. .-  PP-MTAD: Privacy-Preserving and Efficient Multivariate Time Series Anomaly Detection. .-  LogWhisperer: Multi-Log Semantic Similarity Analysis based Intelligent Vehicle Anomaly Detection without Log Template. .-  An Early Detection of Risky Crowd Dynamics Scheme Based on Motion Entropy and Scene Semantics. .-  Enhancing Explainability in X-IDS through Counterfactuals. .-  What Interferes with the Accurate Detection of Origin Hijacking Anomalies?. .-  Network Security & Traffic Analysis. .-  Verifiable and Privacy-Preserving Deep Packet Inspection for Multiple Rule Service Providers. .- Towards Adaptive Network Defense: A Self-Evolving Threat Detection Framework. .-  Early Detection of Malicious Traffic based on Graph Modeling and Spatio-Temporal Attention Approach. .- Revealing the Frailty of Static Benchmarks: The DyNA-IDS Framework for Concept Drift Adaptation in Time-Series Network Intrusion Detection. .-  iSSH: Enabling In-Flight SSH Traffic Inspection without Key Escrow. .-  Tracing Your Roots: Exploring the Security Issues of Root Certificates in Android TLS Connections. .- Exploring the Root Store Usage in TLS-based Applications. .-  LSDBFT: A Loose DAG-based Asynchronous BFT Consensus Algorithm with Fair Ordering. .-  FRanCS: A Fair and Randomized Anonymous Network Circuit Selection Mechanism with Blockchain. .- Robust Training of Efficient Traffic Classifier with Noisy Labels. .-  A Multimodal Asynchronous Federated Learning Approach for Encrypted Traffic Classification.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List