Buch, Englisch, Band 47, 176 Seiten, Gewicht: 294 g
Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers
Buch, Englisch, Band 47, 176 Seiten, Gewicht: 294 g
ISBN: 978-3-642-17501-5
Verlag: Springer
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Wartung & Reparatur
Weitere Infos & Material
Session 1: Identity and Privacy I.- Personalized Mobile Services with Lightweight Security in a Sports Association.- User Authentication for Online Applications Using a USB-Based Trust Device.- XtreemOS-MD SSO.- Session 2: Identity and Privacy II.- A Mobile and Reliable Anonymous ePoll Infrastructure.- Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments.- Session 3: Location and Tracking.- Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks.- A Privacy-Enabled Architecture for Location-Based Services.- A Novel Scheme for Supporting Location Authentication of Mobile Nodes.- Session 4: Ubiquitous Security.- Optimized Resource Access Control in Shared Sensor Networks.- Secure Distribution of the Device Identity in Mobile Access Network.- Network Resilience in Low-Resource Mobile Wireless Sensor Networks.- Session 5: Devices.- An Analysis of the iKee.B iPhone Botnet.- Event-Based Method for Detecting Trojan Horses in Mobile Devices.- AES Data Encryption in a ZigBee Network: Software or Hardware?.