Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
MOBISEC 2010
Other Years
MOBISEC 2009MOBISEC 2010MOBISEC 2011
Ethics and Malpractice Statement

    MOBISEC

    Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

    MobiSec is the second ICST conference on security and privacy for mobile information and communication systems. Within the vast area of mobile technology research and application, MobiSec strives to make a small, but unique, contribution. Our aim is to build a bridge between top-level research and …

    MobiSec is the second ICST conference on security and privacy for mobile information and communication systems. Within the vast area of mobile technology research and application, MobiSec strives to make a small, but unique, contribution. Our aim is to build a bridge between top-level research and large scale applications of novel kinds of information security for mobile devices and communication. It has been a privilege to serve this event as a general chair. In this second edition of MobiSec, beyond attracting excellent scientific papers, MobiSec features a very interesting by-program. Our distinguished keynote speakers Selim Aissi from Intel and Anand Prasad from NEC will shed light on major industries' perspectives. A panel discussion shall give us insight in the importance of the software development cycle in building secure mobile applications. Finally, a tutorial will be held to show novel ways of engineering awareness-rich control interfaces for mobile devices and applications, to build a bridge between privacy and personalisation.

    more »
    Editor(s): Andreas Schmidt (novalyst IT), Giovanni Russello (Create-Net Research Consortium), Antonio Lioy (Dipartimento di Automatica e Informatica), Neeli Prasad (Aalborg University) and Shiguo Lian (France Telecom R&D (Orange Labs) , Haidian District)
    Publisher
    Springer
    ISBN
    978-3-642-17502-2
    Series
    LNICST
    Conference dates
    27th–28th May 2010
    Location
    Catania, Italy
    Appeared in EUDL
    2012-05-28

    Copyright © 2012–2023 ICST

    Ordered by title or year
    Showing 11–14 of 14 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • AES Data Encryption in a ZigBee Network: Software or Hardware?

      Research Article in Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

      Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven Strycker, Jean-Pierre Goemaere
    • An Analysis of the iKee.B iPhone Botnet

      Research Article in Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

      Phillip Porras, Hassen Saïdi, Vinod Yegneswaran
    • Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

      Research Article in Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

      Emmanouil Magkos, Panayiotis Kotzanikolaou
    • Event-Based Method for Detecting Trojan Horses in Mobile Devices

      Research Article in Security and Privacy in Mobile Information and Communication Systems. Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

      Daniel Fuentes, Juan Álvarez, Juan Ortega, Luis González-Abril, Francisco Velasco
    • First
    • Previous
    • 1
    • 2
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico