10% off all books and free delivery over £40
Buy from our bookstore and 25% of the cover price will be given to a school of your choice to buy more books. *15% of eBooks.

Security and Privacy in Mobile Information and Communication Systems

View All Editions (1)

The selected edition of this book is not available to buy right now.
Add To Wishlist
Write A Review

About

Security and Privacy in Mobile Information and Communication Systems Synopsis

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications

About This Edition

ISBN: 9783642044335
Publication date:
Author: Shiguo Lian
Publisher: Springer an imprint of Springer Berlin Heidelberg
Format: Paperback
Pagination: 289 pages
Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Genres: Coding theory and cryptology
Information theory
Systems analysis and design
Algorithms and data structures
Data warehousing
Information retrieval
Data encryption
Applied computing
Computer programming / software engineering