Muutke küpsiste eelistusi

E-raamat: Mobile Internet Security: 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 1921, 2023.





The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
.- 5G and 6G Security.

.- Fake Base Station Detection and Localization in 5G Network: A Proof of
Concept.

.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy:
Through Expanded BAN Logic.

.- Computing Resource Allocation Based on Multi-base Station and Multi-user
Scenario in Mobile Edge Computing.

.- Cryptograhy.

.- Lattice-based Multi-Entity Identification Protocols.

.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic
Computing.

.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and
FPR.

.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning
Based on MKTFHE.

.- Existence of Equivalent Keys in a Random Number Generator with Field Trace
and a Dynamic Mapping.

.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic
Encryption.

.- Generic Construction of Forward-Secure Chameleon Hash Function.

.- Exploring Leakage Characteristics and Attacks through Profiles of
Screaming Channels.

.- Revisiting and Extension of Kannans Embedding for Ring-LWE.

.- Revisiting the algorithm for the quaternion i-isogeny path problems.

.- Machine Learning-based Security.

.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and
Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection
in IoT Networks.

.- Integration Machine Learning Models into the Linux Kernel: Opportunities
and Challenges.

.- Early Weather Warning System with Real-time Monitoring by IoT Sensors
considering Scalability and Reliability.

.- Identification and Authentication.

.- Privacy Preserving Multi Factor Authentication Protocol for Next
Generation Grids Deployed in Smart Cities.

.- Research Directions in Formatl Verification of Network Configurations
Toward Verification of Mobile Network.

.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief
Survey and Analysis.

.- Network Design and Security.

.- Intelligent Cooperative Routing for Services in Computing Integration
Networking.

.- A Biometric-based Data Protection Scheme for Removable Storage Devices.