default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 92 matches
- 2024
- Ilsun You, Michal Choras, Seonghan Shin, Hwankuk Kim, Philip Virgil Astillo:
Mobile Internet Security - 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers. Communications in Computer and Information Science 2095, Springer 2024, ISBN 978-981-97-4464-0 [contents] - 2023
- Osama Ahmed, Hiroshi Kamabe:
Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities. MobiSec 2023: 233-247 - Danmarl Butad, Steven Matthew Tao, Harlee Tudtud, Alvin Joseph Macapagal, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni:
Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. MobiSec 2023: 3-17 - Guoqing Dong, Tianhao Peng, Qixuan Zhang, Huizhi Wang:
Intelligent Cooperative Routing for Services in Computing Integration Networking. MobiSec 2023: 273-285 - Jorge Gallego-Madrid, Irene Bru-Santa, Ramon Sanchez-Iborra, Antonio F. Skarmeta:
Integrating Machine Learning Models into the Linux Kernel: Opportunities and Challenges. MobiSec 2023: 209-219 - Hyungrok Jo, Junji Shikata:
Revisiting the Algorithms for the Quaternion ℓ-Isogeny Path Problems. MobiSec 2023: 181-194 - Gunwoo Kim, Yongho Ko, Ilsun You:
Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic. MobiSec 2023: 18-36 - Itsuki Maebayashi, Yuki Takeuchi, Md. Arshad Ali, Yasuyuki Nogami, Yuta Kodera:
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. MobiSec 2023: 109-120 - Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:
Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels. MobiSec 2023: 152-166 - Seongmin Park, Myeongsu Lee, Sarang Na, Joonhyung Lim:
Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis. MobiSec 2023: 260-270 - Marek Pawlicki, Rafal Kozik, Michal Choras:
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks. MobiSec 2023: 197-208 - Hideki Sakurada, Kouichi Sakurai:
Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks. MobiSec 2023: 248-259 - Cheng-Jhih Shih, Shih-Hao Hung, Ching-Wen Chen, Chiy-Ferng Perng, Meng-Chao Kao, Chi-Sheng Shih, Tei-Wei Kuo:
A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption. MobiSec 2023: 121-135 - Yinjie Song, Hongge Li, Yuhao Chen:
Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing. MobiSec 2023: 66-77 - Noriki Uchida, Tomoyuki Ishida, Hiroaki Yuze, Yoshitaka Shibata:
Early Weather Warning System with Real-Time Monitoring by IoT Sensors Considering Scalability and Reliability. MobiSec 2023: 220-230 - Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji:
Revisiting an Extension of Kannan's Embedding for Ring-LWE. MobiSec 2023: 167-180 - Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Man Chen, Zejiu Tan, Bohan Jin:
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. MobiSec 2023: 94-108 - Ying Wang, Qiang Wang, Zhifan Huang, Fucai Zhou, Changsheng Zhang, Che Bian:
Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR. MobiSec 2023: 78-93 - Yohei Watanabe, Toi Tomita, Junji Shikata:
Lattice-Based Multi-entity Identification Protocols. MobiSec 2023: 51-65 - Pengxuan Wei, Koki Matsubara, Atsuko Miyaji, Yangguang Tian:
Generic Construction of Forward-Secure Chameleon Hash Function. MobiSec 2023: 136-151 - Rui Wu, Yubing Jiang, Peisong Shen:
A Biometric-Based Data Protection Scheme for RSDs. MobiSec 2023: 286-296 - Yaozhang Zhong, Yingkui Du, Jing Zhao, Qinghang Gao, Yujuan Zou, Yong Luo, Kailin Chao, Ziyu Yin:
Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing. MobiSec 2023: 37-48 - 2012
- Mads Schaarup Andersen, Mikkel Baun Kjærgaard, Kaj Grønbæk:
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. MobiSec 2012: 107-118 - Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens:
Claim-Based versus Network-Based Identity Management: A Hybrid Approach. MobiSec 2012: 38-50 - Alexandre Melo Braga, Erick N. Nascimento, Lucas R. Palma:
Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments. MobiSec 2012: 53-54 - Jack Brassil, Pratyusa K. Manadhata:
Verifying the Location of a Mobile Device User. MobiSec 2012: 57-68 - Tassos Dimitriou, Ioannis Krontiris, Ahmad Sabouri:
PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing. MobiSec 2012: 93-106 - Denis Feth, Christian Jung:
Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments. MobiSec 2012: 69-80 - Andreas Leicher, Andreas U. Schmidt, Yogendra Shah:
Scalable Trust Assessment and Remediation of Wireless Devices. MobiSec 2012: 55-56 - Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien:
Securing Mobile Device-Based Machine Interactions with User Location Histories. MobiSec 2012: 81-92
skipping 62 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-06 17:04 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint