


default search action
7th MobiSec 2023: Okinawa, Japan
- Ilsun You

, Michal Choras
, Seonghan Shin
, Hwankuk Kim
, Philip Virgil Astillo
:
Mobile Internet Security - 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers. Communications in Computer and Information Science 2095, Springer 2024, ISBN 978-981-97-4464-0
5G and 6G Security
- Danmarl Butad, Steven Matthew Tao, Harlee Tudtud, Alvin Joseph Macapagal, Philip Virgil Astillo, Gaurav Choudhary

, Nicola Dragoni
:
Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. 3-17 - Gunwoo Kim

, Yongho Ko
, Ilsun You
:
Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic. 18-36 - Yaozhang Zhong, Yingkui Du, Jing Zhao, Qinghang Gao, Yujuan Zou, Yong Luo, Kailin Chao, Ziyu Yin:

Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing. 37-48
Cryptography
- Yohei Watanabe, Toi Tomita

, Junji Shikata:
Lattice-Based Multi-entity Identification Protocols. 51-65 - Yinjie Song

, Hongge Li, Yuhao Chen
:
Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing. 66-77 - Ying Wang, Qiang Wang, Zhifan Huang, Fucai Zhou, Changsheng Zhang, Che Bian:

Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR. 78-93 - Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Man Chen, Zejiu Tan, Bohan Jin:

SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. 94-108 - Itsuki Maebayashi, Yuki Takeuchi, Md. Arshad Ali

, Yasuyuki Nogami
, Yuta Kodera
:
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. 109-120 - Cheng-Jhih Shih, Shih-Hao Hung, Ching-Wen Chen, Chiy-Ferng Perng, Meng-Chao Kao, Chi-Sheng Shih, Tei-Wei Kuo:

A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption. 121-135 - Pengxuan Wei

, Koki Matsubara
, Atsuko Miyaji
, Yangguang Tian
:
Generic Construction of Forward-Secure Chameleon Hash Function. 136-151 - Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:

Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels. 152-166 - Satoshi Uesugi, Shinya Okumura

, Atsuko Miyaji
:
Revisiting an Extension of Kannan's Embedding for Ring-LWE. 167-180 - Hyungrok Jo, Junji Shikata:

Revisiting the Algorithms for the Quaternion ℓ-Isogeny Path Problems. 181-194
Machine Learning-Based Security
- Marek Pawlicki

, Rafal Kozik
, Michal Choras
:
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks. 197-208 - Jorge Gallego-Madrid

, Irene Bru-Santa
, Ramon Sanchez-Iborra
, Antonio F. Skarmeta
:
Integrating Machine Learning Models into the Linux Kernel: Opportunities and Challenges. 209-219 - Noriki Uchida, Tomoyuki Ishida, Hiroaki Yuze, Yoshitaka Shibata:

Early Weather Warning System with Real-Time Monitoring by IoT Sensors Considering Scalability and Reliability. 220-230
Identification and Authentication
- Osama Ahmed, Hiroshi Kamabe:

Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities. 233-247 - Hideki Sakurada, Kouichi Sakurai:

Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks. 248-259 - Seongmin Park

, Myeongsu Lee, Sarang Na, Joonhyung Lim:
Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis. 260-270
Network Design and Security
- Guoqing Dong

, Tianhao Peng
, Qixuan Zhang
, Huizhi Wang
:
Intelligent Cooperative Routing for Services in Computing Integration Networking. 273-285 - Rui Wu, Yubing Jiang, Peisong Shen:

A Biometric-Based Data Protection Scheme for RSDs. 286-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














