{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T09:44:47Z","timestamp":1756460687288,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031460760"},{"type":"electronic","value":"9783031460777"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-46077-7_25","type":"book-chapter","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T11:01:58Z","timestamp":1699268518000},"page":"379-391","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Privacy-First Security Enablers for\u00a06G Networks: The PRIVATEER Approach"],"prefix":"10.1007","author":[{"given":"Dimosthenis","family":"Masouros","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Soudris","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Gardikis","sequence":"additional","affiliation":[]},{"given":"Victoria","family":"Katsarou","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Christopoulou","sequence":"additional","affiliation":[]},{"given":"George","family":"Xilouris","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Ram\u00f3n","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Pastor","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Scaglione","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Petrollini","sequence":"additional","affiliation":[]},{"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[]},{"given":"Antonia","family":"Karamatskou","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Papadakis","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Angelogianni","sequence":"additional","affiliation":[]},{"given":"Thanassis","family":"Giannetsos","sequence":"additional","affiliation":[]},{"given":"Luis Javier Garc\u00eda","family":"Villalba","sequence":"additional","affiliation":[]},{"given":"Jes\u00fas A.","family":"Alonso-L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Strand","sequence":"additional","affiliation":[]},{"given":"Gudmund","family":"Grov","sequence":"additional","affiliation":[]},{"given":"Anastasios N.","family":"Bikos","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Ramantas","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Santos","sequence":"additional","affiliation":[]},{"given":"F\u00e1bio","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Tsampieris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,7]]},"reference":[{"key":"25_CR1","unstructured":"AMD-Xilinx, \u201cUsing Encryption and Authentication to Secure an UltraScale\/UltraScale+ FPGA Bitstream\u201d. https:\/\/docs.xilinx.com\/r\/en-US\/xapp1267-encryp-efuse-program\/Using-Encryption-and-Authentication-to-Secure-an-UltraScale\/UltraScale-FPGA-Bitstream-Application-Note. Accessed 15 May 2023"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s41019-021-00169-x","volume":"6","author":"SS Abraham","year":"2021","unstructured":"Abraham, S.S.: Fairlof: fairness in outlier detection. Data Sci. Eng. 6, 485\u2013499 (2021)","journal-title":"Data Sci. Eng."},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Ara\u00fajo, R., Pinto, A.: Secure remote storage of logs with search capabilities. J. Cybersecur. Privacy 1(2), 340\u2013364 (2021). https:\/\/doi.org\/10.3390\/jcp1020019. https:\/\/www.mdpi.com\/2624-800X\/1\/2\/19","DOI":"10.3390\/jcp1020019"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"46198","DOI":"10.1109\/ACCESS.2019.2909170","volume":"7","author":"FM Ben\u010di\u0107","year":"2019","unstructured":"Ben\u010di\u0107, F.M., Sko\u010dir, P., \u017darko, I.P.: DL-tags: DLT and smart tags for decentralized, privacy-preserving, and verifiable supply chain management. IEEE Access 7, 46198\u201346209 (2019)","journal-title":"IEEE Access"},{"key":"25_CR5","doi-asserted-by":"publisher","unstructured":"Bernardos, C.J., Uusitalo, M.A.: European vision for the 6G network ecosystem (2021). https:\/\/doi.org\/10.5281\/zenodo.5007671","DOI":"10.5281\/zenodo.5007671"},{"key":"25_CR6","unstructured":"Brockners, F., Bhandari, S., Mizrahi, T., Dara, S., Youell, S.: Proof of transit. Internet Engineering Task Force, Internet-Draft draft-ietf-sfcproof-of-transit-06 (2020)"},{"key":"25_CR7","unstructured":"Das, A., Rad, P.: Opportunities and challenges in explainable artificial intelligence (XAI): a survey. arXiv preprint arXiv:2006.11371 (2020)"},{"issue":"2","key":"25_CR8","doi-asserted-by":"publisher","first-page":"914","DOI":"10.3390\/s23020914","volume":"23","author":"R Fernandes","year":"2023","unstructured":"Fernandes, R., Bugla, S., Pinto, P., Pinto, A.: On the performance of secure sharing of classified threat intelligence between multiple entities. Sensors 23(2), 914 (2023). https:\/\/doi.org\/10.3390\/s23020914. www.mdpi.com\/1424-8220\/23\/2\/914","journal-title":"Sensors"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Hu, H., Liu, Y., Wang, Z., Lan, C.: A distributed fair machine learning framework with private demographic data protection. In: 2019 IEEE International Conference on Data Mining (ICDM), pp. 1102\u20131107. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00131"},{"key":"25_CR10","first-page":"209","volume":"30","author":"K Iwahana","year":"2022","unstructured":"Iwahana, K., Yanai, N., Cruz, J.P., Fujiwara, T.: SPGC: integration of secure multiparty computation and differential privacy for gradient computation on collaborative learning. J. Inf. Process. 30, 209\u2013225 (2022)","journal-title":"J. Inf. Process."},{"key":"25_CR11","unstructured":"Jagielski, M., et al.: Differentially private fair learning. In: International Conference on Machine Learning, pp. 3000\u20133008. PMLR (2019)"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/OJCOMS.2021.3057679","volume":"2","author":"W Jiang","year":"2021","unstructured":"Jiang, W., Han, B., Habibi, M.A., Schotten, H.D.: The road towards 6G: a comprehensive survey. IEEE Open J. Commun. Soci. 2, 334\u2013366 (2021)","journal-title":"IEEE Open J. Commun. Soci."},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Katz, M., Pirinen, P., Posti, H.: Towards 6G: getting ready for the next decade. In: 2019 16th International Symposium on Wireless Communication Systems (ISWCS), pp. 714\u2013718. IEEE (2019)","DOI":"10.1109\/ISWCS.2019.8877155"},{"issue":"21","key":"25_CR14","doi-asserted-by":"publisher","first-page":"6876","DOI":"10.3390\/en14216876","volume":"14","author":"MA Kourtis","year":"2021","unstructured":"Kourtis, M.A., et al.: Conceptual evaluation of a 5G network slicing technique for emergency communications and preliminary estimate of energy trade-off. Energies 14(21), 6876 (2021)","journal-title":"Energies"},{"issue":"4","key":"25_CR15","doi-asserted-by":"publisher","first-page":"2146","DOI":"10.1109\/TWC.2017.2789294","volume":"17","author":"YL Lee","year":"2018","unstructured":"Lee, Y.L., Loo, J., Chuah, T.C., Wang, L.C.: Dynamic network slicing for multitenant heterogeneous cloud radio access networks. IEEE Trans. Wireless Commun. 17(4), 2146\u20132161 (2018)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"25_CR16","doi-asserted-by":"publisher","first-page":"74429","DOI":"10.1109\/ACCESS.2018.2881964","volume":"6","author":"R Li","year":"2018","unstructured":"Li, R., et al.: Deep reinforcement learning for resource management in network slicing. IEEE Access 6, 74429\u201374441 (2018)","journal-title":"IEEE Access"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Lux, Z.A., Thatmann, D., Zickau, S., Beierle, F.: Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials. In: 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp. 71\u201378. IEEE (2020)","DOI":"10.1109\/BRAINS49436.2020.9223292"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri, V., Parizi, R.M., Pouriyeh, S., Huang, Y., Dehghantanha, A., Srivastava, G.: A survey on security and privacy of federated learning. Futur. Gener. Comput. Syst. 115, 619\u2013640 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"25_CR19","doi-asserted-by":"publisher","first-page":"2384","DOI":"10.1109\/COMST.2021.3108618","volume":"23","author":"VL Nguyen","year":"2021","unstructured":"Nguyen, V.L., Lin, P.C., Cheng, B.C., Hwang, R.H., Lin, Y.D.: Security and privacy for 6G: a survey on prospective technologies and challenges. IEEE Commun. Surv. Tutorials 23(4), 2384\u20132428 (2021)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"25_CR20","unstructured":"Pentyala, S., et al.: Training differentially private models with secure multiparty computation. arXiv preprint arXiv:2202.02625 (2022)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Shekhar, S., Shah, N., Akoglu, L.: Fairod: fairness-aware outlier detection. In: Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society (2021)","DOI":"10.1145\/3461702.3462517"},{"issue":"3","key":"25_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2988546","volume":"49","author":"RV Steiner","year":"2016","unstructured":"Steiner, R.V., Lupu, E.: Attestation in wireless sensor networks: a survey. ACM Comput. Surv. (CSUR) 49(3), 1\u201331 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Wagner, C., Dulaunoy, A., Wagener, G., Iklody, A.: Misp: The design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, pp. 49\u201356 (2016)","DOI":"10.1145\/2994539.2994542"},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-020-2955-6","volume":"64","author":"X You","year":"2021","unstructured":"You, X., et al.: Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 64, 1\u201374 (2021)","journal-title":"Sci. China Inf. Sci."},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, H., Davidson, I.: Towards fair deep anomaly detection. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency (2021)","DOI":"10.1145\/3442188.3445878"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, J., Wu, D., Chen, B., Yu, S.: Poisoning attack in federated learning using generative adversarial nets. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 374\u2013380. IEEE (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"issue":"3","key":"25_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3340557","volume":"12","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Qu, G.: Recent attacks and defenses on FPGA-based systems. ACM Trans. Reconfigurable Technol. Syst. (TRETS) 12(3), 1\u201324 (2019)","journal-title":"ACM Trans. Reconfigurable Technol. Syst. (TRETS)"},{"issue":"3","key":"25_CR28","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MWC.2019.1800234","volume":"26","author":"S Zhang","year":"2019","unstructured":"Zhang, S.: An overview of network slicing for 5G. IEEE Wirel. Commun. 26(3), 111\u2013117 (2019)","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"25_CR29","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.3390\/s21041174","volume":"21","author":"YB Zikria","year":"2021","unstructured":"Zikria, Y.B., Ali, R., Afzal, M.K., Kim, S.W.: Next-generation internet of things (IoT): opportunities, challenges, and solutions. Sensors 21(4), 1174 (2021)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Embedded Computer Systems: Architectures, Modeling, and Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-46077-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T11:04:33Z","timestamp":1699268673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-46077-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031460760","9783031460777"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-46077-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAMOS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Embedded Computer Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Samos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"samos2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/samos-conference.com\/wp\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Softconf","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}