Mobile Internet Security
7th International Conference, MobiSec 2023, Okinawa, Japan, December 19¿21, 2023, Revised Selected Papers
Herausgegeben:You, Ilsun; Choras, Michal; Shin, Seonghan; Kim, Hwankuk; Astillo, Philip Virgil
Mobile Internet Security
7th International Conference, MobiSec 2023, Okinawa, Japan, December 19¿21, 2023, Revised Selected Papers
Herausgegeben:You, Ilsun; Choras, Michal; Shin, Seonghan; Kim, Hwankuk; Astillo, Philip Virgil
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19-21, 2023.
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
- Information Security Applications37,99 €
- Security and Privacy in Communication Networks37,99 €
- Security and Trust Management48,99 €
- Security and Privacy in Communication Networks73,99 €
- Information Security and Privacy67,99 €
- Computer Security37,99 €
- Mobile Internet Security59,99 €
-
-
-
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
- Produktdetails
- Communications in Computer and Information Science 2095
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-4464-0
- 2024
- Seitenzahl: 312
- Erscheinungstermin: 12. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 17mm
- Gewicht: 476g
- ISBN-13: 9789819744640
- ISBN-10: 9819744644
- Artikelnr.: 70739293
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
- Communications in Computer and Information Science 2095
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-4464-0
- 2024
- Seitenzahl: 312
- Erscheinungstermin: 12. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 17mm
- Gewicht: 476g
- ISBN-13: 9789819744640
- ISBN-10: 9819744644
- Artikelnr.: 70739293
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan's Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan's Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.