Security and Privacy: 4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings

Author:   Sihem Mesnager ,  Pantelimon Stănică ,  Kamalesh Acharya ,  Sumit Kumar Debnath
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032128331


Pages:   227
Publication Date:   02 December 2025
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.17 Quantity:  
Add to Cart

Share |

Security and Privacy: 4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings


Overview

Full Product Details

Author:   Sihem Mesnager ,  Pantelimon Stănică ,  Kamalesh Acharya ,  Sumit Kumar Debnath
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032128331


ISBN 10:   3032128331
Pages:   227
Publication Date:   02 December 2025
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

.- Mathematical Foundation of Cryptography .- Design and Implementation of a Cybersecurity-Enhanced In Four-Channel EEG Monitoring System Using Eight Electrodes. .- Review on the Implications of crystals Kyber in LTE networks. .- Scalable Dual-Stage Design for Robust Security in WSNs. .- Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive-Exclusive Properties. .- Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials. .- Authentication Key Management .- Privacy-Preserving Auditable Authentication Scheme for Vehicular Ad-hoc Networks. .- Fortifying Security: Towards Strong Active Outsider-Resilient CRT-Based Group Key Management. .- Simulating Multi-Agent Reasoning for Diverse and Adaptive Career Strategies: A Review. .- Machine Learning in Cybersecurity .- SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES. .- Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism. .- A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models. .- A Quorum-based Privacy-Preserving Distributed Learning Framework for Anomaly Detection. .- Hybrid DCGAN-ResNet50 model for Fake Face Detection. .- Encrypted training using logistic regression with different polynomial approximations of sigmoid function.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List