Lian, Shiguo
Security and Privacy in Mobile Information and Communication Systems
1. On Trust Evaluation in Mobile Ad Hoc Networks
Dang Quan Nguyen, Louise Lamont, Peter C. Mason
2. A Distributed Data Storage Scheme for Sensor Networks
Abhishek Parakh, Subhash Kak
3. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf
4. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET
Chae Duk Jung, Chul Sur, Youngho Park, Kyung-Hyune Rhee
5. An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response
Daniel M. Hein, Ronald Toegl
6. An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian
7. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms
Xinwen Zhang, Onur Acıiçmez, Jean-Pierre Seifert
8. Context-Aware Monitoring of Untrusted Mobile Applications
Andrew Brown, Mark Ryan
9. Extending the Belgian eID Technology with Mobile Security Functionality
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart Decker
10. Filtering SPAM in P2PSIP Communities with Web of Trust
Juho Heikkilä, Andrei Gurtov
11. Generating Random and Pseudorandom Sequences in Mobile Devices
Jan Krhovjak, Vashek Matyas, Jiri Zizkovsky
12. A Context-Aware Security Framework for Next Generation Mobile Networks
Matteo Bandinelli, Federica Paganelli, Gianluca Vannuccini, Dino Giuli
13. Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna
Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka
14. Protecting Privacy and Securing the Gathering of Location Proofs – The Secure Location Verification Proof Gathering Protocol
Michelle Graham, David Gray
15. Providing Strong Security and High Privacy in Low-Cost RFID Networks
Mathieu David, Neeli R. Prasad
16. Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs
Gianni Fenu, Gary Steri
17. SAVAH: Source Address Validation with Host Identity Protocol
Dmitriy Kuptsov, Andrei Gurtov
18. Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP
Maria Chiara Laghi, Michele Amoretti, Gianni Conte
19. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications
Mike Meyerstein, Inhyok Cha, Yogendra Shah
20. Simple Peer-to-Peer SIP Privacy
Joakim Koskela, Sasu Tarkoma
21. On Modeling Viral Diffusion in Heterogeneous Wireless Networks
Hoai-Nam Nguyen, Yoichi Shinoda
22. Mobile WiMAX Network Security
Rainer Falk, Christian Günther, Dirk Kröselberg, Avi Lior
23. LoPSiL: A Location-Based Policy-Specification Language
Jay Ligatti, Billy Rickey, Nalin Saigal
24. Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
Reiner Dojen, Vladimir Pasca, Tom Coffey
Keywords: Computer Science, Data Encryption, Data Structures, Cryptology and Information Theory, Information Systems Applications (incl.Internet), System Performance and Evaluation, Computer Communication Networks, Computer Systems Organization and Communication Networks
- Author(s)
- Lian, Shiguo
- Schmidt, Andreas U.
- Publisher
- Springer
- Publication year
- 2009
- Language
- en
- Edition
- 1
- Series
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783642044342