Mobile Internet Security (eBook, PDF)
7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers
Redaktion: You, Ilsun; Astillo, Philip Virgil; Kim, Hwankuk; Shin, Seonghan; Choras, Michal
	 60,95 €
								 60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
 60,95 €
									
						Als Download kaufen
						
					
				 60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
							Jetzt verschenken
							
Alle Infos zum eBook verschenken
						
					 60,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
30 °P sammeln
Mobile Internet Security (eBook, PDF)
7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers
Redaktion: You, Ilsun; Astillo, Philip Virgil; Kim, Hwankuk; Shin, Seonghan; Choras, Michal
- Format: PDF
 
- Merkliste
 - Auf die Merkliste
 - Bewerten Bewerten
 - Teilen
 - Produkt teilen
 - Produkterinnerung
 - Produkterinnerung
 

							Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
							bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
						Hier können Sie sich einloggen
							Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
						
					
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19-21, 2023.
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in  the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
- Geräte: PC
 - ohne Kopierschutz
 - eBook Hilfe
 - Größe: 16.51MB
 
Andere Kunden interessierten sich auch für
Information Security and Privacy (eBook, PDF)72,95 €
Information Security Applications (eBook, PDF)40,95 €
Security and Privacy in Communication Networks (eBook, PDF)40,95 €
Security and Trust Management (eBook, PDF)52,95 €
Security and Privacy in Communication Networks (eBook, PDF)72,95 €
Information Security and Cryptology (eBook, PDF)40,95 €
Mobile Internet Security (eBook, PDF)68,95 €- 				
 - 				
 - 				
 
					
					This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19-21, 2023.
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
				The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
					- Produktdetails
 - Verlag: Springer Nature Singapore
 - Seitenzahl: 298
 - Erscheinungstermin: 11. Juli 2024
 - Englisch
 - ISBN-13: 9789819744657
 - Artikelnr.: 72242644
 
- Verlag: Springer Nature Singapore
 - Seitenzahl: 298
 - Erscheinungstermin: 11. Juli 2024
 - Englisch
 - ISBN-13: 9789819744657
 - Artikelnr.: 72242644
 
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
 
.- 5G and 6G Security.
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan's Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.
	.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan's Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.
.- 5G and 6G Security.
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan's Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.
				.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan's Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.







