E-Book, Englisch, 342 Seiten, eBook
Reihe: IFIP Advances in Information and Communication Technology
Technology, tools, applications, authentication and security IFIP World Conference on Mobile Communications 2 – 6 September 1996, Canberra, Australia
E-Book, Englisch, 342 Seiten, eBook
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-0-387-34980-0
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Keynote Paper.- 1 Trends of flat displays in the multimedia age.- Track 1 Mobile Technology, Tools and Applications.- 2 System support and applications for mobile computing.- 3 Developments in mobile data system technology — particularly GSM.- 4 Replication-support for advanced mobile applications.- 5 Caching data over a broadcast channel.- 6 Mobile frames: a pragmatic approach to automatic application partitioning based on an end-user data model.- 7 Generic personal communications support for open service environments.- 8 Supporting user mobility.- 9 Designing secure agents with O.O. technologies for user’s mobility.- 10 The idea: integrating authoring concepts for mobile agents into an authoring tool for active multimedia mail.- 11 Animation within mobile multimedia on-line services.- 12 Theoretical analyses of data communications integrated into cordless voice channels.- 13 Random access, reservation and polling multiaccess protocol for wireless data systems.- 14 Challenges in mobile information systems and services.- 15 A buffer overhead minimization method for multicast-based handoff in picocellular networks.- 16 Impact of mobility in mobile communication systems.- 17 Mobile computing based on GSM: the Mowgli approach.- 18 An adaptive data distribution system for mobile environments.- 19 Object oriented system architecture and strategies for the exchange of structured multimedia data with mobile hosts.- 20 Agent skills and their roles in mobile computing and personal communications.- 21 A global QoS management for wireless network.- 22 Resource discovery protocol for mobile computing.- Track 2 Trusting in Technology, Authentication, Security.- 23 The future of smart cards: technology and application.- 24 Use of smart cards for security applications by DeutscheTelekom.- 25 An authentication and security protocol for mobile computing.- 26 Design of secure end-to-end protocols for mobile systems.- 27 Yet another simple internet electronic payment system.- 28 Difficulties in achieving security in mobile communications.- 29 GSM digital cellular telephone system: a case study of encryption algorithms.- 30 A new algorithm for smart cards.- 31 A new approach to integrity of digital images.- 32 How to protect multimedia applications.- 33 Phone card application and authentication in wireless communications.- 34 Real-time mobile EFTPOS: challenges and implications of a world first application.- Index of Contributors.- Keyword Index.