Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Security and Privacy in Mobile Information and Communication Systems

Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

  • Conference proceedings
  • © 2010

Overview

Editors:
  1. Andreas U. Schmidt
    1. novalyst IT, Karben, Germany

    You can also search for this editor inPubMed Google Scholar

  2. Giovanni Russello
    1. Create-Net Research Consortium, Povo, Italy

    You can also search for this editor inPubMed Google Scholar

  3. Antonio Lioy
    1. Politecnico di Torino, Dipartimento di Automatica e Informatica, Torino, Italy

    You can also search for this editor inPubMed Google Scholar

  4. Neeli R. Prasad
    1. Center for TeleInFrastruktur, Aalborg University, Aalborg East, Denmark

    You can also search for this editor inPubMed Google Scholar

  5. Shiguo Lian
    1. France Telecom R&D (Orange Labs) , Haidian District, Beijing, China

    You can also search for this editor inPubMed Google Scholar

  • Up to date results
  • Fast conference proceedings
  • State-of-the-art report

Included in the following conference series:

Conference proceedings info: MobiSec 2010.

  • 7167Accesses

This is a preview of subscription content,log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access

About this book

MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

Similar content being viewed by others

Keywords

Table of contents (14 papers)

  1. Session 1: Identity and Privacy I

    1. Front Matter

      Pages 1-1
    2. Personalized Mobile Services with Lightweight Security in a Sports Association

      • Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens
      Pages 3-14
    3. User Authentication for Online Applications Using a USB-Based Trust Device

      • Julian Jang, Dongxi Liu, Surya Nepal, John Zic
      Pages 15-26
    4. XtreemOS-MD SSO

      • José María Peribáñez, Alvaro Martínez, Santiago Prieto, Noé Gallego
      Pages 27-38
  2. Session 2: Identity and Privacy II

    1. Front Matter

      Pages 39-39
    2. A Mobile and Reliable Anonymous ePoll Infrastructure

      • Pieter Verhaeghe, Kristof Verslype, Jorn Lapon, Vincent Naessens, Bart De Decker
      Pages 41-52
  3. Session 3: Location and Tracking

    1. Front Matter

      Pages 65-65
    2. A Novel Scheme for Supporting Location Authentication of Mobile Nodes

      • Osama Elshakankiry, Andy Carpenter, Ning Zhang
      Pages 91-102
  4. Session 4: Ubiquitous Security

    1. Front Matter

      Pages 103-103
    2. Optimized Resource Access Control in Shared Sensor Networks

      • Christophe Huygens, Nelson Matthys, Wouter Joosen
      Pages 105-116
    3. Network Resilience in Low-Resource Mobile Wireless Sensor Networks

      • Bai Li, Lynn Margaret Batten, Robin Doss
      Pages 127-138
  5. Session 5: Devices

    1. Front Matter

      Pages 139-139
    2. An Analysis of the iKee.B iPhone Botnet

      • Phillip Porras, Hassen Saïdi, Vinod Yegneswaran
      Pages 141-152
    3. Event-Based Method for Detecting Trojan Horses in Mobile Devices

      • Daniel Fuentes, Juan A. Álvarez, Juan A. Ortega, Luis González-Abril, Francisco Velasco
      Pages 153-162
    4. AES Data Encryption in a ZigBee Network: Software or Hardware?

      • Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere
      Pages 163-173

Editors and Affiliations

  • novalyst IT, Karben, Germany

    Andreas U. Schmidt

  • Create-Net Research Consortium, Povo, Italy

    Giovanni Russello

  • Politecnico di Torino, Dipartimento di Automatica e Informatica, Torino, Italy

    Antonio Lioy

  • Center for TeleInFrastruktur, Aalborg University, Aalborg East, Denmark

    Neeli R. Prasad

  • France Telecom R&D (Orange Labs) , Haidian District, Beijing, China

    Shiguo Lian

Bibliographic Information

Publish with us

Back to top

Access this book

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access


[8]ページ先頭

©2009-2025 Movatter.jp