|
|
|
|
LEADER |
03473nam a22005535i 4500 |
001 |
7610 |
003 |
DE-He213 |
005 |
20130725192917.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642044342
|9 978-3-642-04434-2
|
024 |
7 |
# |
|a 10.1007/978-3-642-04434-2
|2 doi
|
050 |
# |
4 |
|a QA76.9.A25
|
072 |
# |
7 |
|a URY
|2 bicssc
|
072 |
# |
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
# |
|a Schmidt, Andreas U.
|e editor.
|
245 |
1 |
0 |
|a Security and Privacy in Mobile Information and Communication Systems
|b First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers /
|c edited by Andreas U. Schmidt, Shiguo Lian.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2009.
|
300 |
# |
# |
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|v 17
|x 1867-8211 ;
|
520 |
# |
# |
|a MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer network architectures.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Computer system performance.
|
650 |
# |
0 |
|a Data structures (Computer science).
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Information Systems Applications (incl.Internet).
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
700 |
1 |
# |
|a Lian, Shiguo.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642044335
|
830 |
# |
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|v 17
|x 1867-8211 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-04434-2
|
912 |
# |
# |
|a ZDB-2-SCS
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|