Normal view MARC view ISBD view

Mobile Internet Security [electronic resource] : 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers / edited by Ilsun You, Michał Choraś, Seonghan Shin, Hwankuk Kim, Philip Virgil Astillo.

Contributor(s): You, Ilsun [editor.] | Choraś, Michał [editor.] | Shin, Seonghan [editor.] | Kim, Hwankuk [editor.] | Astillo, Philip Virgil [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Communications in Computer and Information Science: 2095Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2024Edition: 1st ed. 2024.Description: XIII, 298 p. 96 illus., 69 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789819744657.Subject(s): Data protection | Artificial intelligence | Computer networks  | Data and Information Security | Artificial Intelligence | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
-- 5G and 6G Security. -- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. -- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic. -- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing. -- Cryptograhy. -- Lattice-based Multi-Entity Identification Protocols. -- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing. -- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR. -- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. -- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. -- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption. -- Generic Construction of Forward-Secure Chameleon Hash Function. -- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels. -- Revisiting and Extension of Kannan's Embedding for Ring-LWE. -- Revisiting the algorithm for the quaternion i-isogeny path problems. -- Machine Learning-based Security. -- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks. -- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges. -- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability. -- Identification and Authentication. -- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities. -- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network. -- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis. -- Network Design and Security. -- Intelligent Cooperative Routing for Services in Computing Integration Networking. -- A Biometric-based Data Protection Scheme for Removable Storage Devices.
In: Springer Nature eBookSummary: This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19-21, 2023. The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
    average rating: 0.0 (0 votes)
No physical items for this record

-- 5G and 6G Security. -- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. -- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic. -- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing. -- Cryptograhy. -- Lattice-based Multi-Entity Identification Protocols. -- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing. -- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR. -- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. -- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. -- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption. -- Generic Construction of Forward-Secure Chameleon Hash Function. -- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels. -- Revisiting and Extension of Kannan's Embedding for Ring-LWE. -- Revisiting the algorithm for the quaternion i-isogeny path problems. -- Machine Learning-based Security. -- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks. -- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges. -- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability. -- Identification and Authentication. -- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities. -- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network. -- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis. -- Network Design and Security. -- Intelligent Cooperative Routing for Services in Computing Integration Networking. -- A Biometric-based Data Protection Scheme for Removable Storage Devices.

This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19-21, 2023. The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.

There are no comments for this item.

Log in to your account to post a comment.