000 03926nam a22005895i 4500
001 978-3-642-17502-2
003 DE-He213
005 20140220084551.0
007 cr nn 008mamaa
008 101127s2010 gw | s |||| 0|eng d
020 _a9783642175022
_9978-3-642-17502-2
024 7 _a10.1007/978-3-642-17502-2
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aSchmidt, Andreas U.
_eeditor.
245 1 0 _aSecurity and Privacy in Mobile Information and Communication Systems
_h[electronic resource] :
_bSecond International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers /
_cedited by Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXII, 176p. 44 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v47
505 0 _aSession 1: Identity and Privacy I -- Personalized Mobile Services with Lightweight Security in a Sports Association -- User Authentication for Online Applications Using a USB-Based Trust Device -- XtreemOS-MD SSO -- Session 2: Identity and Privacy II -- A Mobile and Reliable Anonymous ePoll Infrastructure -- Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments -- Session 3: Location and Tracking -- Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks -- A Privacy-Enabled Architecture for Location-Based Services -- A Novel Scheme for Supporting Location Authentication of Mobile Nodes -- Session 4: Ubiquitous Security -- Optimized Resource Access Control in Shared Sensor Networks -- Secure Distribution of the Device Identity in Mobile Access Network -- Network Resilience in Low-Resource Mobile Wireless Sensor Networks -- Session 5: Devices -- An Analysis of the iKee.B iPhone Botnet -- Event-Based Method for Detecting Trojan Horses in Mobile Devices -- AES Data Encryption in a ZigBee Network: Software or Hardware?.
520 _aMobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aData Encryption.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aComputers and Society.
700 1 _aRussello, Giovanni.
_eeditor.
700 1 _aLioy, Antonio.
_eeditor.
700 1 _aPrasad, Neeli R.
_eeditor.
700 1 _aLian, Shiguo.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642175015
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v47
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-17502-2
912 _aZDB-2-SCS
999 _c112918
_d112918