default search action
7th MobiSec 2023: Okinawa, Japan
- Ilsun You, Michal Choras, Seonghan Shin, Hwankuk Kim, Philip Virgil Astillo:
Mobile Internet Security - 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers. Communications in Computer and Information Science 2095, Springer 2024, ISBN 978-981-97-4464-0
5G and 6G Security
- Danmarl Butad, Steven Matthew Tao, Harlee Tudtud, Alvin Joseph Macapagal, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni:
Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. 3-17 - Gunwoo Kim, Yongho Ko, Ilsun You:
Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic. 18-36 - Yaozhang Zhong, Yingkui Du, Jing Zhao, Qinghang Gao, Yujuan Zou, Yong Luo, Kailin Chao, Ziyu Yin:
Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing. 37-48
Cryptography
- Yohei Watanabe, Toi Tomita, Junji Shikata:
Lattice-Based Multi-entity Identification Protocols. 51-65 - Yinjie Song, Hongge Li, Yuhao Chen:
Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing. 66-77 - Ying Wang, Qiang Wang, Zhifan Huang, Fucai Zhou, Changsheng Zhang, Che Bian:
Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR. 78-93 - Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Man Chen, Zejiu Tan, Bohan Jin:
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. 94-108 - Itsuki Maebayashi, Yuki Takeuchi, Md. Arshad Ali, Yasuyuki Nogami, Yuta Kodera:
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. 109-120 - Cheng-Jhih Shih, Shih-Hao Hung, Ching-Wen Chen, Chiy-Ferng Perng, Meng-Chao Kao, Chi-Sheng Shih, Tei-Wei Kuo:
A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption. 121-135 - Pengxuan Wei, Koki Matsubara, Atsuko Miyaji, Yangguang Tian:
Generic Construction of Forward-Secure Chameleon Hash Function. 136-151 - Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:
Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels. 152-166 - Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji:
Revisiting an Extension of Kannan's Embedding for Ring-LWE. 167-180 - Hyungrok Jo, Junji Shikata:
Revisiting the Algorithms for the Quaternion ℓ-Isogeny Path Problems. 181-194
Machine Learning-Based Security
- Marek Pawlicki, Rafal Kozik, Michal Choras:
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks. 197-208 - Jorge Gallego-Madrid, Irene Bru-Santa, Ramon Sanchez-Iborra, Antonio F. Skarmeta:
Integrating Machine Learning Models into the Linux Kernel: Opportunities and Challenges. 209-219 - Noriki Uchida, Tomoyuki Ishida, Hiroaki Yuze, Yoshitaka Shibata:
Early Weather Warning System with Real-Time Monitoring by IoT Sensors Considering Scalability and Reliability. 220-230
Identification and Authentication
- Osama Ahmed, Hiroshi Kamabe:
Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities. 233-247 - Hideki Sakurada, Kouichi Sakurai:
Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks. 248-259 - Seongmin Park, Myeongsu Lee, Sarang Na, Joonhyung Lim:
Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis. 260-270
Network Design and Security
- Guoqing Dong, Tianhao Peng, Qixuan Zhang, Huizhi Wang:
Intelligent Cooperative Routing for Services in Computing Integration Networking. 273-285 - Rui Wu, Yubing Jiang, Peisong Shen:
A Biometric-Based Data Protection Scheme for RSDs. 286-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.