Atjaunināt sīkdatņu piekrišanu

Mobile Internet Security: 7th International Conference, MobiSec 2023, Okinawa, Japan, December 1921, 2023, Revised Selected Papers 2024 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 298 pages, height x width: 235x155 mm, 69 Illustrations, color; 27 Illustrations, black and white; XIII, 298 p. 96 illus., 69 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 2095
  • Izdošanas datums: 12-Jul-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 9819744644
  • ISBN-13: 9789819744640
  • Mīkstie vāki
  • Cena: 69,22 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 81,44 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 298 pages, height x width: 235x155 mm, 69 Illustrations, color; 27 Illustrations, black and white; XIII, 298 p. 96 illus., 69 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 2095
  • Izdošanas datums: 12-Jul-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 9819744644
  • ISBN-13: 9789819744640
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 1921, 2023.





The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
.- 5G and 6G Security.

.- Fake Base Station Detection and Localization in 5G Network: A Proof of
Concept.

.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy:
Through Expanded BAN Logic.

.- Computing Resource Allocation Based on Multi-base Station and Multi-user
Scenario in Mobile Edge Computing.

.- Cryptograhy.

.- Lattice-based Multi-Entity Identification Protocols.

.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic
Computing.

.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and
FPR.

.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning
Based on MKTFHE.

.- Existence of Equivalent Keys in a Random Number Generator with Field Trace
and a Dynamic Mapping.

.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic
Encryption.

.- Generic Construction of Forward-Secure Chameleon Hash Function.

.- Exploring Leakage Characteristics and Attacks through Profiles of
Screaming Channels.

.- Revisiting and Extension of Kannans Embedding for Ring-LWE.

.- Revisiting the algorithm for the quaternion i-isogeny path problems.

.- Machine Learning-based Security.

.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and
Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection
in IoT Networks.

.- Integration Machine Learning Models into the Linux Kernel: Opportunities
and Challenges.

.- Early Weather Warning System with Real-time Monitoring by IoT Sensors
considering Scalability and Reliability.

.- Identification and Authentication.

.- Privacy Preserving Multi Factor Authentication Protocol for Next
Generation Grids Deployed in Smart Cities.

.- Research Directions in Formatl Verification of Network Configurations
Toward Verification of Mobile Network.

.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief
Survey and Analysis.

.- Network Design and Security.

.- Intelligent Cooperative Routing for Services in Computing Integration
Networking.

.- A Biometric-based Data Protection Scheme for Removable Storage Devices.