𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

✍ Scribed by Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens (auth.), Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2010
Tongue
English
Leaves
178
Series
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 47
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

✦ Table of Contents


Front Matter....Pages -
Front Matter....Pages 1-1
Personalized Mobile Services with Lightweight Security in a Sports Association....Pages 3-14
User Authentication for Online Applications Using a USB-Based Trust Device....Pages 15-26
XtreemOS-MD SSO....Pages 27-38
Front Matter....Pages 39-39
A Mobile and Reliable Anonymous ePoll Infrastructure....Pages 41-52
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments....Pages 53-64
Front Matter....Pages 65-65
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks....Pages 67-79
A Privacy-Enabled Architecture for Location-Based Services....Pages 80-90
A Novel Scheme for Supporting Location Authentication of Mobile Nodes....Pages 91-102
Front Matter....Pages 103-103
Optimized Resource Access Control in Shared Sensor Networks....Pages 105-116
Secure Distribution of the Device Identity in Mobile Access Network....Pages 117-126
Network Resilience in Low-Resource Mobile Wireless Sensor Networks....Pages 127-138
Front Matter....Pages 139-139
An Analysis of the iKee.B iPhone Botnet....Pages 141-152
Event-Based Method for Detecting Trojan Horses in Mobile Devices....Pages 153-162
AES Data Encryption in a ZigBee Network: Software or Hardware?....Pages 163-173
Back Matter....Pages -

✦ Subjects


Computer Communication Networks; Management of Computing and Information Systems; Data Encryption; Algorithm Analysis and Problem Complexity; Information Systems Applications (incl.Internet); Computers and Society


πŸ“œ SIMILAR VOLUMES


Security and Privacy in Mobile Informati
✍ Peter Teufl, Stefan Kraxberger, Clemens Orthacker, GΓΌnther Lackner, Michael Giss πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected fro

Security and Privacy in Mobile Informati
✍ Dang Quan Nguyen, Louise Lamont (auth.), Andreas U. Schmidt, Shiguo Lian (eds.) πŸ“‚ Library πŸ“… 2009 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge

Security and Privacy in Mobile Informati
✍ Simon Meurer, Roland WismΓΌller (auth.), Andreas U. Schmidt, Giovanni Russello, I πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully sel

Information Systems Security and Privacy
✍ Olivier Camp, Steven Furnell, Paolo Mori (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p><p>This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016.</p><p>The 9 full papers presented together with two invited papers were carefully reviewed and selected from

Security and Privacy in Communication Ne
✍ Sarshad Abubaker, Kui Wu (auth.), Angelos D. Keromytis, Roberto Di Pietro (eds.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions

Security and Privacy in Mobile Informati
✍ Shiguo Lian πŸ“‚ Library πŸ“… 2009 πŸ› Springer 🌐 English

<P>MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge bet