Atjaunināt sīkdatņu piekrišanu

E-grāmata: Mobile Internet Security: 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 1921, 2023.





The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
.- 5G and 6G Security.

.- Fake Base Station Detection and Localization in 5G Network: A Proof of
Concept.

.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy:
Through Expanded BAN Logic.

.- Computing Resource Allocation Based on Multi-base Station and Multi-user
Scenario in Mobile Edge Computing.

.- Cryptograhy.

.- Lattice-based Multi-Entity Identification Protocols.

.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic
Computing.

.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and
FPR.

.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning
Based on MKTFHE.

.- Existence of Equivalent Keys in a Random Number Generator with Field Trace
and a Dynamic Mapping.

.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic
Encryption.

.- Generic Construction of Forward-Secure Chameleon Hash Function.

.- Exploring Leakage Characteristics and Attacks through Profiles of
Screaming Channels.

.- Revisiting and Extension of Kannans Embedding for Ring-LWE.

.- Revisiting the algorithm for the quaternion i-isogeny path problems.

.- Machine Learning-based Security.

.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and
Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection
in IoT Networks.

.- Integration Machine Learning Models into the Linux Kernel: Opportunities
and Challenges.

.- Early Weather Warning System with Real-time Monitoring by IoT Sensors
considering Scalability and Reliability.

.- Identification and Authentication.

.- Privacy Preserving Multi Factor Authentication Protocol for Next
Generation Grids Deployed in Smart Cities.

.- Research Directions in Formatl Verification of Network Configurations
Toward Verification of Mobile Network.

.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief
Survey and Analysis.

.- Network Design and Security.

.- Intelligent Cooperative Routing for Services in Computing Integration
Networking.

.- A Biometric-based Data Protection Scheme for Removable Storage Devices.