Mobile Internet Security: 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19–21, 2023, Revised Selected Papers: Communications in Computer and Information Science, cartea 2095
Editat de Ilsun You, Michał Choraś, Seonghan Shin, Hwankuk Kim, Philip Virgil Astilloen Limba Engleză Paperback – 12 iul 2024
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
Din seria Communications in Computer and Information Science
- 20%
Preț: 423.24 lei - 20%
Preț: 460.23 lei - 20%
Preț: 579.53 lei - 20%
Preț: 457.99 lei - 20%
Preț: 313.10 lei - 20%
Preț: 643.20 lei - 20%
Preț: 312.30 lei - 20%
Preț: 324.99 lei - 20%
Preț: 630.84 lei - 20%
Preț: 634.45 lei - 20%
Preț: 321.17 lei - 20%
Preț: 324.68 lei - 20%
Preț: 631.00 lei - 20%
Preț: 631.31 lei - 20%
Preț: 633.83 lei -
Preț: 377.68 lei - 20%
Preț: 388.03 lei - 20%
Preț: 317.05 lei -
Preț: 371.37 lei - 20%
Preț: 323.23 lei - 20%
Preț: 423.43 lei - 20%
Preț: 321.81 lei - 20%
Preț: 319.13 lei - 20%
Preț: 630.51 lei - 20%
Preț: 325.61 lei - 20%
Preț: 321.17 lei - 20%
Preț: 321.81 lei - 20%
Preț: 325.79 lei - 20%
Preț: 640.83 lei - 20%
Preț: 323.23 lei - 20%
Preț: 325.79 lei - 20%
Preț: 317.68 lei - 20%
Preț: 635.26 lei - 15%
Preț: 623.39 lei - 20%
Preț: 628.32 lei - 20%
Preț: 319.42 lei - 20%
Preț: 324.99 lei - 20%
Preț: 1014.25 lei - 20%
Preț: 804.07 lei - 20%
Preț: 529.17 lei - 20%
Preț: 631.31 lei - 20%
Preț: 1183.08 lei - 20%
Preț: 494.64 lei - 20%
Preț: 387.99 lei - 20%
Preț: 318.67 lei - 20%
Preț: 388.88 lei - 20%
Preț: 323.23 lei - 20%
Preț: 458.42 lei - 20%
Preț: 530.03 lei - 20%
Preț: 632.09 lei
Preț: 484.60 lei
Preț vechi: 605.75 lei
-20%
Puncte Express: 727
Preț estimativ în valută:
85.78€ • 100.07$ • 74.28£
85.78€ • 100.07$ • 74.28£
Carte tipărită la comandă
Livrare economică 26 februarie-12 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789819744640
ISBN-10: 9819744644
Pagini: 298
Ilustrații: XIII, 298 p. 96 illus., 69 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.44 kg
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
ISBN-10: 9819744644
Pagini: 298
Ilustrații: XIII, 298 p. 96 illus., 69 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.44 kg
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
Cuprins
.- 5G and 6G Security.
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan’s Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan’s Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.