You / Choras / Choras | Mobile Internet Security | Buch | 978-981-97-4464-0 | sack.de

Buch, Englisch, 298 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 476 g

Reihe: Communications in Computer and Information Science

You / Choras / Choras

Mobile Internet Security

7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers
2024
ISBN: 978-981-97-4464-0
Verlag: Springer Nature Singapore

7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers

Buch, Englisch, 298 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 476 g

Reihe: Communications in Computer and Information Science

ISBN: 978-981-97-4464-0
Verlag: Springer Nature Singapore


This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19–21, 2023.

The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.

You / Choras / Choras Mobile Internet Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- 5G and 6G Security.
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan’s Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.