Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19–21, 2023.
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
.- 5G and 6G Security.
.- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
.- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic.
.- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing.
.- Cryptograhy.
.- Lattice-based Multi-Entity Identification Protocols.
.- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing.
.- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR.
.- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
.- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
.- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption.
.- Generic Construction of Forward-Secure Chameleon Hash Function.
.- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels.
.- Revisiting and Extension of Kannan’s Embedding for Ring-LWE.
.- Revisiting the algorithm for the quaternion i-isogeny path problems.
.- Machine Learning-based Security.
.- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
.- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges.
.- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability.
.- Identification and Authentication.
.- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities.
.- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network.
.- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis.
.- Network Design and Security.
.- Intelligent Cooperative Routing for Services in Computing Integration Networking.
.- A Biometric-based Data Protection Scheme for Removable Storage Devices.
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.