Login

Lian, Shiguo

Security and Privacy in Mobile Information and Communication Systems

Lian, Shiguo - Security and Privacy in Mobile Information and Communication Systems, ebook

50,60€

Ebook, PDF with Adobe DRM
ISBN: 9783642044342
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. On Trust Evaluation in Mobile Ad Hoc Networks
Dang Quan Nguyen, Louise Lamont, Peter C. Mason

2. A Distributed Data Storage Scheme for Sensor Networks
Abhishek Parakh, Subhash Kak

3. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf

4. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET
Chae Duk Jung, Chul Sur, Youngho Park, Kyung-Hyune Rhee

5. An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response
Daniel M. Hein, Ronald Toegl

6. An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian

7. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms
Xinwen Zhang, Onur Acıiçmez, Jean-Pierre Seifert

8. Context-Aware Monitoring of Untrusted Mobile Applications
Andrew Brown, Mark Ryan

9. Extending the Belgian eID Technology with Mobile Security Functionality
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart Decker

10. Filtering SPAM in P2PSIP Communities with Web of Trust
Juho Heikkilä, Andrei Gurtov

11. Generating Random and Pseudorandom Sequences in Mobile Devices
Jan Krhovjak, Vashek Matyas, Jiri Zizkovsky

12. A Context-Aware Security Framework for Next Generation Mobile Networks
Matteo Bandinelli, Federica Paganelli, Gianluca Vannuccini, Dino Giuli

13. Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna
Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka

14. Protecting Privacy and Securing the Gathering of Location Proofs – The Secure Location Verification Proof Gathering Protocol
Michelle Graham, David Gray

15. Providing Strong Security and High Privacy in Low-Cost RFID Networks
Mathieu David, Neeli R. Prasad

16. Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs
Gianni Fenu, Gary Steri

17. SAVAH: Source Address Validation with Host Identity Protocol
Dmitriy Kuptsov, Andrei Gurtov

18. Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP
Maria Chiara Laghi, Michele Amoretti, Gianni Conte

19. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications
Mike Meyerstein, Inhyok Cha, Yogendra Shah

20. Simple Peer-to-Peer SIP Privacy
Joakim Koskela, Sasu Tarkoma

21. On Modeling Viral Diffusion in Heterogeneous Wireless Networks
Hoai-Nam Nguyen, Yoichi Shinoda

22. Mobile WiMAX Network Security
Rainer Falk, Christian Günther, Dirk Kröselberg, Avi Lior

23. LoPSiL: A Location-Based Policy-Specification Language
Jay Ligatti, Billy Rickey, Nalin Saigal

24. Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
Reiner Dojen, Vladimir Pasca, Tom Coffey

Keywords: Computer Science, Data Encryption, Data Structures, Cryptology and Information Theory, Information Systems Applications (incl.Internet), System Performance and Evaluation, Computer Communication Networks, Computer Systems Organization and Communication Networks

Similar titles