E-Book, Englisch, Band 17, 298 Seiten, eBook
First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
E-Book, Englisch, Band 17, 298 Seiten, eBook
ISBN: 978-3-642-04434-2
Verlag: Springer
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
On Trust Evaluation in Mobile Ad Hoc Networks.- A Distributed Data Storage Scheme for Sensor Networks.- A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications.- A Robust Conditional Privacy-Preserving Authentication Protocol in VANET.- An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response.- An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.- Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms.- Context-Aware Monitoring of Untrusted Mobile Applications.- Extending the Belgian eID Technology with Mobile Security Functionality.- Filtering SPAM in P2PSIP Communities with Web of Trust.- Generating Random and Pseudorandom Sequences in Mobile Devices.- A Context-Aware Security Framework for Next Generation Mobile Networks.- Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna.- Protecting Privacy and Securing the Gathering of Location Proofs – The Secure Location Verification Proof Gathering Protocol.- Providing Strong Security and High Privacy in Low-Cost RFID Networks.- Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs.- SAVAH: Source Address Validation with Host Identity Protocol.- Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP.- Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications.- Simple Peer-to-Peer SIP Privacy.- On Modeling Viral Diffusion in Heterogeneous Wireless Networks.- Mobile WiMAX Network Security.- LoPSiL: A Location-Based Policy-Specification Language.- Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications.