|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Ilsun You , Michał Choraś , Seonghan Shin , Hwankuk KimPublisher: Springer Verlag, Singapore Imprint: Springer Nature Edition: 2024 ed. Volume: 2095 ISBN: 9789819744640ISBN 10: 9819744644 Pages: 298 Publication Date: 12 July 2024 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents.- 5G and 6G Security. .- Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. .- Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic. .- Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing. .- Cryptograhy. .- Lattice-based Multi-Entity Identification Protocols. .- Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing. .- Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR. .- SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. .- Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. .- A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption. .- Generic Construction of Forward-Secure Chameleon Hash Function. .- Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels. .- Revisiting and Extension of Kannan’s Embedding for Ring-LWE. .- Revisiting the algorithm for the quaternion i-isogeny path problems. .- Machine Learning-based Security. .- The Impact of Data Scaling Approaches on Deep Learning, Random Forest, and Nearest Neighbor-based Network Intrusion Detection Systems for DoS Detection in IoT Networks. .- Integration Machine Learning Models into the Linux Kernel: Opportunities and Challenges. .- Early Weather Warning System with Real-time Monitoring by IoT Sensors considering Scalability and Reliability. .- Identification and Authentication. .- Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities. .- Research Directions in Formatl Verification of Network Configurations Toward Verification of Mobile Network. .- Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis. .- Network Design and Security. .- Intelligent Cooperative Routing for Services in Computing Integration Networking. .- A Biometric-based Data Protection Scheme for Removable Storage Devices.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |