default search action
2. MobiSec 2010: Catania, Sicily, Italy
- Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 47, Springer 2010, ISBN 978-3-642-17501-5
Part 1 / Session 1: Identity and Privacy I
- Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Personalized Mobile Services with Lightweight Security in a Sports Association. 3-14 - Julian Jang, Dongxi Liu, Surya Nepal, John Zic:
User Authentication for Online Applications Using a USB-Based Trust Device. 15-26 - José María Peribáñez, Alvaro Martínez, Santiago Prieto, Noé Gallego:
XtreemOS-MD SSO - A Plugable, Modular SSO Software for Mobile Grids. 27-38
Part 2 / Session 2: Identity and Privacy II
- Pieter Verhaeghe, Kristof Verslype, Jorn Lapon, Vincent Naessens, Bart De Decker:
A Mobile and Reliable Anonymous ePoll Infrastructure. 41-52 - Emmanouil Magkos, Panayiotis Kotzanikolaou:
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments. 53-64
Part 3 / Session 3: Location and Tracking
- Saif M. Al-Kuwari, Stephen D. Wolthusen:
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. 67-79 - Martin Werner:
A Privacy-Enabled Architecture for Location-Based Services. 80-90 - Osama A. Elshakankiry, Andy Carpenter, Ning Zhang:
A Novel Scheme for Supporting Location Authentication of Mobile Nodes. 91-102
Part 4 / Session 4: Ubiquitous Security
- Christophe Huygens, Nelson Matthys, Wouter Joosen:
Optimized Resource Access Control in Shared Sensor Networks. 105-116 - Konstantin Shemyak:
Secure Distribution of the Device Identity in Mobile Access Network. 117-126 - Bai Li, Lynn Margaret Batten, Robin Doss:
Network Resilience in Low-Resource Mobile Wireless Sensor Networks. 127-138
Part 5 / Session 5: Devices
- Phillip A. Porras, Hassen Saïdi, Vinod Yegneswaran:
An Analysis of the iKee.B iPhone Botnet. 141-152 - Daniel Fuentes, Juan Antonio Álvarez, Juan Antonio Ortega, Luis González Abril, Francisco Velasco Morente:
Event-Based Method for Detecting Trojan Horses in Mobile Devices. 153-162 - Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere:
AES Data Encryption in a ZigBee Network: Software or Hardware? 163-173
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.