About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
MOBISEC 2009
Other Years
MOBISEC 2009MOBISEC 2010MOBISEC 2011
Ethics and Malpractice Statement
Back to LNICST

    MOBISEC

    Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

    The convergence of information and communication technology is most palpable in the form of intelligent mobile devices, accompanied by the advent of converged, and next-generation, communication networks. As mobile communication and information processing becomes a commodity, economy and society re…

    The convergence of information and communication technology is most palpable in the form of intelligent mobile devices, accompanied by the advent of converged, and next-generation, communication networks. As mobile communication and information processing becomes a commodity, economy and society require protection of this precious resource. MobiSec brings together leading-edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymakers.

    more »
    Editor(s): Andreas Schmidt (novalyst IT AG) and Shiguo Lian (France Telecom R&D)
    Publisher
    Springer
    ISBN
    978-3-642-04434-2
    Series
    LNICST
    Conference dates
    3rd–5th Jun 2009
    Location
    Turin, Italy
    Appeared in EUDL
    2012-05-17

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 21–24 of 24 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications

      Research Article in Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

      Reiner Dojen, Vladimir Pasca, Tom Coffey
    • Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP

      Research Article in Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

      Maria Laghi, Michele Amoretti, Gianni Conte
    • Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

      Research Article in Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

      Mike Meyerstein, Inhyok Cha, Yogendra Shah
    • SAVAH: Source Address Validation with Host Identity Protocol

      Research Article in Security and Privacy in Mobile Information and Communication Systems. First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

      Dmitriy Kuptsov, Andrei Gurtov
    • First
    • Previous
    • 1
    • 2
    • 3
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL