default search action
1. MobiSec 2009: Turin, Italy
- Andreas U. Schmidt, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 17, Springer 2009, ISBN 978-3-642-04433-5 - Dang-Quan Nguyen, Louise Lamont, Peter C. Mason:
On Trust Evaluation in Mobile Ad Hoc Networks. 1-13 - Abhishek Parakh, Subhash C. Kak:
A Distributed Data Storage Scheme for Sensor Networks. 14-22 - Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf:
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications. 23-34 - Chae Duk Jung, Chul Sur, Youngho Park, Kyung Hyune Rhee:
A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. 35-45 - Daniel M. Hein, Ronald Toegl:
An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response. 46-57 - Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. 58-70 - Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. 71-82 - Andrew Brown, Mark Ryan:
Context-Aware Monitoring of Untrusted Mobile Applications. 83-96 - Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart De Decker:
Extending the Belgian eID Technology with Mobile Security Functionality. 97-109 - Juho Heikkilä, Andrei V. Gurtov:
Filtering SPAM in P2PSIP Communities with Web of Trust. 110-121 - Jan Krhovjak, Vashek Matyas, Jiri Zizkovsky:
Generating Random and Pseudorandom Sequences in Mobile Devices. 122-133 - Matteo Bandinelli, Federica Paganelli, Gianluca Vannuccini, Dino Giuli:
A Context-Aware Security Framework for Next Generation Mobile Networks. 134-147 - Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka:
Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna. 148-159 - Michelle Graham, David Gray:
Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. 160-171 - Mathieu David, Neeli R. Prasad:
Providing Strong Security and High Privacy in Low-Cost RFID Networks. 172-179 - Gianni Fenu, Gary Steri:
Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs. 180-189 - Dmitriy Kuptsov, Andrei V. Gurtov:
SAVAH: Source Address Validation with Host Identity Protocol . 190-201 - Maria Chiara Laghi, Michele Amoretti, Gianni Conte:
Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP. 202-213 - Mike Meyerstein, Inhyok Cha, Yogendra Shah:
Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications. 214-225 - Joakim Koskela, Sasu Tarkoma:
Simple Peer-to-Peer SIP Privacy. 226-237 - Hoai-Nam Nguyen, Yoichi Shinoda:
On Modeling Viral Diffusion in Heterogeneous Wireless Networks . 238-252 - Rainer Falk, Christian Günther, Dirk Kröselberg, Avi Lior:
Mobile WiMAX Network Security. 253-264 - Jay Ligatti, Billy Rickey, Nalin Saigal:
LoPSiL: A Location-Based Policy-Specification Language. 265-277 - Reiner Dojen, Vladimir Pasca, Tom Coffey:
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. 278-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.