Skip to main content
  • Conference proceedings
  • © 2019

Mobile Internet Security

Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers

Part of the book series: Communications in Computer and Information Science (CCIS, volume 971)

Conference series link(s): MobiSec: International Symposium on Mobile Internet Security

Conference proceedings info: MobiSec 2017.

Buy it now

Buying options

eBook USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 papers)

  1. Front Matter

    Pages I-X
  2. Generating Dynamic Box by Using an Input String

    • Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen
    Pages 17-29
  3. SAAS: A Secure Anonymous Authentication Scheme for PMIPv6

    • Tianhan Gao, Xinyang Deng, Fanghua Geng
    Pages 30-50
  4. FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device

    • Mookyu Park, Jaehyeok Han, Junwoo Seo, Haengrok Oh, Kyungho Lee
    Pages 51-64
  5. Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads

    • Daniil A. Bashmakov, Anatoliy G. Korobeynikov, Alexey V. Sivachev, Didier El Baz, Dmitry Levshun
    Pages 65-82
  6. Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains

    • Alexey V. Sivachev, Daniil A. Bashmakov, Olga V. Mikhailishenko, Anatoliy G. Korobeynikov, Roland Rieke
    Pages 83-95
  7. Voronoi Maps for Planar Sensor Networks Visualization

    • Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Martin Strecker
    Pages 96-109
  8. An Efficient Facebook Place Information Extraction Strategy

    • Jong-Shin Chen, Chuan-Bi Lin, Cheng-Ying Yang, Yung-Fa Huang
    Pages 131-139
  9. Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction

    • Jyh-Horng Wen, Fang-Yu Chang, Yung-Fa Huang, Hsing-Chung Chen, Zon-Yin Shae
    Pages 140-150
  10. A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing

    • Tsung-Ju Lee, Shian-Shyong Tseng, Hsing-Chung Chen, Sung-Chiang Lin, Chiun-How Kao
    Pages 151-156
  11. An SDN-Based Secure Mobility Model for UAV-Ground Communications

    • Rajesh Kumar, Mohd. Abuzar Sayeed, Vishal Sharma, Ilsun You
    Pages 169-179
  12. Back Matter

    Pages 181-181

About this book

This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017.

The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.

Editors and Affiliations

  • Department of Information Security Engineering, Soonchunhyang University, Choongchungnam-do, Korea (Republic of)

    Ilsun You

  • Asian University Taiwan, Taichung, Taiwan

    Hsing-Chung Chen

  • Department of Information Security, Soonchunhyang University, Seoul, Korea (Republic of)

    Vishal Sharma

  • SPIIRAS, St. Petersburg, Russia

    Igor Kotenko

Bibliographic Information

Buy it now

Buying options

eBook USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access