Protecting virtual identities in mobile IP-based communication:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Stuttgart
Univ., Inst. für Kommunikationsnetze und Rechnersysteme
2007
|
Schriftenreihe: | Communication networks and computer engineering
98 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 185 S. graph. Darst. |
ISBN: | 9783938965092 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV023350840 | ||
003 | DE-604 | ||
005 | 20101013 | ||
007 | t | ||
008 | 080618s2007 d||| m||| 00||| eng d | ||
020 | |a 9783938965092 |9 978-3-938965-09-2 | ||
035 | |a (OCoLC)244011166 | ||
035 | |a (DE-599)BVBBV023350840 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-29T |a DE-83 |a DE-703 | ||
082 | 0 | |a 004.6 |2 22/ger | |
100 | 1 | |a Hauser, Christian |e Verfasser |0 (DE-588)134283244 |4 aut | |
245 | 1 | 0 | |a Protecting virtual identities in mobile IP-based communication |c Christian Hauser |
264 | 1 | |a Stuttgart |b Univ., Inst. für Kommunikationsnetze und Rechnersysteme |c 2007 | |
300 | |a XX, 185 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Communication networks and computer engineering |v 98 | |
502 | |a Zugl.: Stuttgart, Univ., Diss., 2007 | ||
650 | 0 | 7 | |a Mobiles Internet |0 (DE-588)7627927-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Mobiles Internet |0 (DE-588)7627927-3 |D s |
689 | 0 | 1 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | |5 DE-604 | |
830 | 0 | |a Communication networks and computer engineering |v 98 |w (DE-604)BV021539246 |9 98 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016534457&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016534457 |
Datensatz im Suchindex
_version_ | 1804137708550881280 |
---|---|
adam_text | PROTECTING VIRTUAL IDENTITIES IN MOBILE IP-BASED COMMUNICATION VON DER
FAKULTAT FUR INFORMATIK, ELEKTROTECHNIK UND INFORMATIONSTECHNIK DER
UNIVERSITAT STUTTGART ZUR ERIANGUNG DER WURDE EINES DOKTOR-LNGENIEURS
(DR.-LNG.) GENEHMIGTE ABHANDLUNG VORGELEGT VON CHRISTIAN HAUSER GEB. IN
HECHINGEN HAUPTBERICHTER: PROF. DR.-LNG. DR. H. C. MULT. PAUL J. KUHN
MITBERICHTER: PROF. DR.-LNG. ERWIN P. RATHGEB, UNIVERSITAT
DUISBURG-ESSEN TAG DER EINREICHUNG: 08. OKTOBER 2007 TAG DER MUNDLICHEN
PRUFUNG: 20. DEZEMBER 2007 INSTITUT FUR KOMMUNIKATIONSNETZE UYID
RECHNERSYSTEME DER UNIVERSITAT STUTTGART 2007 CONTENTS SUMMARY I
ZUSAMMENFASSUNG III CONTENTS V FIGURES IX TABLES XIII ABBREVIATIONS XV
SYMBOLS XIX CHAPTER 1: INTRODUCTION 1 1.1 PRIVACY IN FUTURE IT SYSTEMS
J. : 1 1.2 VIRTUAL IDENTITIES FOR PRIVACY PROTECTION 3 1.3 OVERVIEW OF
THE THESIS 5 CHAPTER 2: FUNDAMENTALS , 7 2.1 SECURITY AND PRIVACY ,. 7
2.1.1 SECURITY ?....-. 7 2.1.2 PRIVACY . 10 2.1.2.1 ANONYMITY,
UNLINKABILITY, UNDETECTABILITY, AND UNOBSERVABILITY 2.1.2.2 PSEUDONYMITY
AND IDENTITY 2.2 KNOWLEDGE ENGINEERING 13 2.2.1 DATA, INFORMATION,
KNOWLEDGE, WISDOM 13 2.2.2 FACTS AND RULES ?.. 14 2.2.3 INFERENCE /. 16
2.2.4 KNOWLEDGE REPRESENTATION 16 VI CONTENTS 2.3 FUNCTIONS AND
FUNCTIONAL DEPENDENCIES 20 2.3.1 MATHEMATICAL RELATIONS 20 2.3.2
FUNCTIONAL DEPENDENCIES 21 2.4 MOBILITY MANAGEMENT IN IP 23 2.4.1
OVERVIEW 23 2.4.2 MOBILE IPV6 24 2.4.2.1 MOBILE IPV6 FUNCTIONALITY
2.4.2.2 AUTOCONFIGURATION OF IPV6 ADDRESSES 2.5 PROBLEM STRUCTURE AND
FOCUS 27 2.5.1 OVERALL MODEL OF THE SCENARIO 27 2.5.2 PROBLEM SCOPE 30
CHAPTER 3: THREAT ANALYSIS METHODOLOGY AND ITS APPLICATION TO MOBILE
IPV6 33 3.1 GOALS 33 3.2 KNOWLEDGE MODEL 34 3.2.1 MINIWORLD OF INTEREST
34 3.2.2 MODELLING 35 3.2.2.1 METHODOLOGY FOR CREATING THE ELEMENTARY
FACT TYPE VIEW ON THE MODEL 3.2.2.2 PROTECTION GOALS FOR EVALUATION OF
MOBILE IPV6 3.2.2.3 ASSUMPTIONS FOR EVALUATION OF MOBILE IPV6 3.2.2.4
ELEMENTARY FACT TYPE VIEW ON MODEL OF MOBILE IPV6 3.2.2.5 METHODOLOGY
FOR CREATING THE DYNAMIC VIEW ON THE MODEL 3.2.2.6 DYNAMIC VIEW OF
MOBILE IPV6 3.3 EVALUATION 49 3.3.1 PREPARATIONS 50 3.3.1.1 POTENTIAL
ATTACKERS 3.3.1.2 OBSERVATIONS 3.3.1.3 INFERENCE OF NEW FACTS 3.3.1.4
LINKING OF FACT SETS 3.3.2 EVALUATION 53 3.3.2.1 SINGLE ATTACKERS AND
HOMOGENEOUS ATTACKER GROUPS 3.3.2.2 HETEROGENEOUS ATTACKER GROUPS ., 3.4
SUMMARY OF EVALUATION H .Z.. 59 3.5 RELATED WORK !...-; 60 3.5.1
KNOWLEDGE REPRESENTATION V 60 3.5.2 DATA MINING 61 3.5.3 LINK DETECTION
IN DATABASES 62 3.5.4 INFERENCE IN DATABASES 63 3.5.5 METHODOLOGY 65
CONTENTS VII CHAPTER 4: IMPROVEMENT METHODOLOGY AND ITS APPLICATION TO
MOBILE IPV6 69 4.1 METHODOLOGY 70 4.1.1 OBSERVATIONS 71 4.1.1.1
AVOIDANCE OF OBSERVATIONS 4.1.1.2 PARTITIONING OF OBSERVATIONS 4.1.2
INTERPRETATIONS 74 4.1.2.1 AVOIDANCE OF NEW FACT INFERENCES 4.1.2.2
AVOIDANCE OF FACT SET LINKS 4.2 APPLICATION OF THE METHODOLOGY TO MOBILE
IPV6 77 4.2.1 OBSERVATIONS 78 4.2.1.1 AVOIDANCE OF OBSERVATIONS 4.2.1.2
PARTITIONING OF OBSERVATIONS 4.2.2 INTERPRETATIONS 83 4.2.2.1 AVOIDANCE
OF NEW FACT INFERENCES 4.2.2.2 AVOIDANCE OF FACT SET LINKS 4.3 NEW
ARCHITECTURE 89 4.3.1 ENCRYPTION VIEW 89 4.3.2 FUNCTIONAL VIEW 90 4.3.3
PROTOTYPE 91 4.3.4 DISCUSSION OF THE ARCHITECTURE IN A BROADER SCOPE 92
4.4 RELATED WORK 93 4.4.1 METHODOLOGY 93 4.4.2 ARCHITECTURES 94 4.4.2.1
PRIVACY-ENHANCING ARCHITECTURES FOR NON-MOBILE USERS 4.4.2.2
PRIVACY-ENHANCING ARCHITECTURES FOR MOBILE USERS CHAPTER 5: EVALUATION
OF SCENARIO-INDEPENDENT THREATS IN THE NEW ARCHITECTURE 103 5.1 GOALS I
: 103 5.2 KNOWLEDGE MODEL 104 5.2.1 PROTECTION GOALS FOR EVALUATION OF
THE NEW ARCHITECTURE 104 5.2.2 ASSUMPTIONS FOR EVALUATION OF THE NEW
ARCHITECTURE 104 5.2.3 ELEMENTARY FACT TYPE VIEW ON MODEL OF THE NEW
ARCHITECTURE 105 5.2.4 DYNAMIC VIEW ON MODEL OF THE NEW ARCHITECTURE 109
5.3 EVALUATION . 112 5.3.1 PREPARATIONS 112 5.3.1.1 POTENTIAL ATTACKERS
5.3.1.2 OBSERVATIONS 5.3.1.3 INFERENCE OF NEW FACTS 5.3.1.4 LINKING OF
FACT SETS 5.3.2 EVALUATION ?. 117 5.3.2.1 SINGLE ATTACKERS AND
HOMOGENEOUS ATTACKER GROUPS 5.3.2.2 HETEROGENEOUS ATTACKER GROUPS 5.4
SUMMARY OF EVALUATION 132 VIII CONTENTS CHAPTER 6: SIMULATIVE EVALUATION
OF SCENARIO-DEPENDENT THREATS IN THE NEW ARCHITEC- TURE 135 6.1 GOALS *.
135 6.2 METRICS 136 6.2.1 PRIVACY METRICS FROM LITERATURE 136 6.2.2 MEAN
TIME FOR THE FIRST LINK 137 6.2.3 TRACELET CARDINALITY 138 6.2.4 MEAN
NUMBER OF CARE-OF ADDRESS OBSERVERS 139 6.3 SIMULATION MODEL 140 6.3.1
SYSTEM 140 6.3.1.1 MODEL 6.3.1.2 METRICS 6.3.2 PARAMETERS OF THE
SCENARIO 142 6.3.2.1 USER MOVEMENT 6.3.2.2 COMMUNICATION 6.3.3 SYSTEM
CONFIGURATION 145 6.4 EVALUATION 146 6.4.1 BASIC BEHAVIOR 146 6.4.1.1
INFLUENCE OF NUMBER OF VIDS ON MTFFL 6.4.1.2 INFLUENCE OF TRAFFIC
PARAMETERS ON MTFFL 6.4.1.3 INFLUENCE OF NUMBER OF VIDS ON MNCO 6.4.1.4
INFLUENCE OF NUMBER OF VIDS ON TRACELETS 6.4.2 MULTIPLE SERVERS WITHOUT
SERVER CHANGES 150 6.4.2.1 INFLUENCE OF NUMBER OF SERVERS ON MTFFL
6.4.2.2 INFLUENCE OF NUMBER OF SERVERS ON MNCO 6.4.2.3 INFLUENCE OF
NUMBER OF SERVERS ON TRACELETS 6.4.3 MULTIPLE SERVERS WITH SERVER
CHANGES 152 6.4.3.1 INFLUENCE OF MOVEMENT AND SERVER CHANGE PROBABILITY
ON MTFFL 6.4.3.2 INFLUENCE OF MOVEMENT AND SERVER CHANGE PROBABILITY ON
TRACELETS 6.5 SUMMARY OF EVALUATION 158 6.5.1 SUMMARY OF RAW RESULTS 158
6.5.2 INFLUENCE OF SYSTEM CONFIGURATION ON PRIVACY METRICS / 158 6.5.3
INFLUENCE OF PARAMETERS ON PRIVACY METRICS / .. 160 6.5.4 DIFFERENT
SYSTEMS: MTFFL VS. TRACELET CARDINALITY 160 6.5.5 DIMENSIONING . 162
CHAPTER 7: CONCLUSIONS AND FURTHER WORK 163 BIBLIOGRAPHY 167
|
adam_txt |
PROTECTING VIRTUAL IDENTITIES IN MOBILE IP-BASED COMMUNICATION VON DER
FAKULTAT FUR INFORMATIK, ELEKTROTECHNIK UND INFORMATIONSTECHNIK DER
UNIVERSITAT STUTTGART ZUR ERIANGUNG DER WURDE EINES DOKTOR-LNGENIEURS
(DR.-LNG.) GENEHMIGTE ABHANDLUNG VORGELEGT VON CHRISTIAN HAUSER GEB. IN
HECHINGEN HAUPTBERICHTER: PROF. DR.-LNG. DR. H. C. MULT. PAUL J. KUHN
MITBERICHTER: PROF. DR.-LNG. ERWIN P. RATHGEB, UNIVERSITAT
DUISBURG-ESSEN TAG DER EINREICHUNG: 08. OKTOBER 2007 TAG DER MUNDLICHEN
PRUFUNG: 20. DEZEMBER 2007 INSTITUT FUR KOMMUNIKATIONSNETZE UYID
RECHNERSYSTEME DER UNIVERSITAT STUTTGART 2007 CONTENTS SUMMARY I
ZUSAMMENFASSUNG III CONTENTS V FIGURES IX TABLES XIII ABBREVIATIONS XV
SYMBOLS XIX CHAPTER 1: INTRODUCTION 1 1.1 PRIVACY IN FUTURE IT SYSTEMS
J. : ' 1 1.2 VIRTUAL IDENTITIES FOR PRIVACY PROTECTION 3 1.3 OVERVIEW OF
THE THESIS 5 CHAPTER 2: FUNDAMENTALS , 7 2.1 SECURITY AND PRIVACY ,. 7
2.1.1 SECURITY ?.-. 7 2.1.2 PRIVACY . 10 2.1.2.1 ANONYMITY,
UNLINKABILITY, UNDETECTABILITY, AND UNOBSERVABILITY 2.1.2.2 PSEUDONYMITY
AND IDENTITY 2.2 KNOWLEDGE ENGINEERING 13 2.2.1 DATA, INFORMATION,
KNOWLEDGE, WISDOM 13 2.2.2 FACTS AND RULES ?. 14 2.2.3 INFERENCE /. 16
2.2.4 KNOWLEDGE REPRESENTATION 16 VI CONTENTS 2.3 FUNCTIONS AND
FUNCTIONAL DEPENDENCIES 20 2.3.1 MATHEMATICAL RELATIONS 20 2.3.2
FUNCTIONAL DEPENDENCIES 21 2.4 MOBILITY MANAGEMENT IN IP 23 2.4.1
OVERVIEW 23 2.4.2 MOBILE IPV6 24 2.4.2.1 MOBILE IPV6 FUNCTIONALITY
2.4.2.2 AUTOCONFIGURATION OF IPV6 ADDRESSES 2.5 PROBLEM STRUCTURE AND
FOCUS 27 2.5.1 OVERALL MODEL OF THE SCENARIO 27 2.5.2 PROBLEM SCOPE 30
CHAPTER 3: THREAT ANALYSIS METHODOLOGY AND ITS APPLICATION TO MOBILE
IPV6 33 3.1 GOALS 33 3.2 KNOWLEDGE MODEL 34 3.2.1 MINIWORLD OF INTEREST
34 3.2.2 MODELLING 35 3.2.2.1 METHODOLOGY FOR CREATING THE ELEMENTARY
FACT TYPE VIEW ON THE MODEL 3.2.2.2 PROTECTION GOALS FOR EVALUATION OF
MOBILE IPV6 3.2.2.3 ASSUMPTIONS FOR EVALUATION OF MOBILE IPV6 3.2.2.4
ELEMENTARY FACT TYPE VIEW ON MODEL OF MOBILE IPV6 3.2.2.5 METHODOLOGY
FOR CREATING THE DYNAMIC VIEW ON THE MODEL 3.2.2.6 DYNAMIC VIEW OF
MOBILE IPV6 3.3 EVALUATION 49 3.3.1 PREPARATIONS 50 3.3.1.1 POTENTIAL
ATTACKERS 3.3.1.2 OBSERVATIONS 3.3.1.3 INFERENCE OF NEW FACTS 3.3.1.4
LINKING OF FACT SETS 3.3.2 EVALUATION 53 3.3.2.1 SINGLE ATTACKERS AND
HOMOGENEOUS ATTACKER GROUPS 3.3.2.2 HETEROGENEOUS ATTACKER GROUPS ., 3.4
SUMMARY OF EVALUATION H .Z. 59 3.5 RELATED WORK !.-; 60 3.5.1
KNOWLEDGE REPRESENTATION V 60 3.5.2 DATA MINING 61 3.5.3 LINK DETECTION
IN DATABASES 62 3.5.4 INFERENCE IN DATABASES 63 3.5.5 METHODOLOGY 65
CONTENTS VII CHAPTER 4: IMPROVEMENT METHODOLOGY AND ITS APPLICATION TO
MOBILE IPV6 69 4.1 METHODOLOGY 70 4.1.1 OBSERVATIONS 71 4.1.1.1
AVOIDANCE OF OBSERVATIONS 4.1.1.2 PARTITIONING OF OBSERVATIONS 4.1.2
INTERPRETATIONS 74 4.1.2.1 AVOIDANCE OF NEW FACT INFERENCES 4.1.2.2
AVOIDANCE OF FACT SET LINKS 4.2 APPLICATION OF THE METHODOLOGY TO MOBILE
IPV6 77 4.2.1 OBSERVATIONS 78 4.2.1.1 AVOIDANCE OF OBSERVATIONS 4.2.1.2
PARTITIONING OF OBSERVATIONS 4.2.2 INTERPRETATIONS 83 4.2.2.1 AVOIDANCE
OF NEW FACT INFERENCES 4.2.2.2 AVOIDANCE OF FACT SET LINKS 4.3 NEW
ARCHITECTURE 89 4.3.1 ENCRYPTION VIEW 89 4.3.2 FUNCTIONAL VIEW 90 4.3.3
PROTOTYPE 91 4.3.4 DISCUSSION OF THE ARCHITECTURE IN A BROADER SCOPE 92
4.4 RELATED WORK 93 4.4.1 METHODOLOGY 93 4.4.2 ARCHITECTURES 94 4.4.2.1
PRIVACY-ENHANCING ARCHITECTURES FOR NON-MOBILE USERS 4.4.2.2
PRIVACY-ENHANCING ARCHITECTURES FOR MOBILE USERS CHAPTER 5: EVALUATION
OF SCENARIO-INDEPENDENT THREATS IN THE NEW ARCHITECTURE 103 5.1 GOALS I
: 103 5.2 KNOWLEDGE MODEL 104 5.2.1 PROTECTION GOALS FOR EVALUATION OF
THE NEW ARCHITECTURE 104 5.2.2 ASSUMPTIONS FOR EVALUATION OF THE NEW
ARCHITECTURE 104 5.2.3 ELEMENTARY FACT TYPE VIEW ON MODEL OF THE NEW
ARCHITECTURE 105 5.2.4 DYNAMIC VIEW ON MODEL OF THE NEW ARCHITECTURE 109
5.3 EVALUATION .' 112 5.3.1 PREPARATIONS 112 5.3.1.1 POTENTIAL ATTACKERS
5.3.1.2 OBSERVATIONS 5.3.1.3 INFERENCE OF NEW FACTS 5.3.1.4 LINKING OF
FACT SETS 5.3.2 EVALUATION ?. 117 5.3.2.1 SINGLE ATTACKERS AND
HOMOGENEOUS ATTACKER GROUPS 5.3.2.2 HETEROGENEOUS ATTACKER GROUPS 5.4
SUMMARY OF EVALUATION 132 VIII CONTENTS CHAPTER 6: SIMULATIVE EVALUATION
OF SCENARIO-DEPENDENT THREATS IN THE NEW ARCHITEC- TURE 135 6.1 GOALS *.
135 6.2 METRICS 136 6.2.1 PRIVACY METRICS FROM LITERATURE 136 6.2.2 MEAN
TIME FOR THE FIRST LINK 137 6.2.3 TRACELET CARDINALITY 138 6.2.4 MEAN
NUMBER OF CARE-OF ADDRESS OBSERVERS 139 6.3 SIMULATION MODEL 140 6.3.1
SYSTEM 140 6.3.1.1 MODEL 6.3.1.2 METRICS 6.3.2 PARAMETERS OF THE
SCENARIO 142 6.3.2.1 USER MOVEMENT 6.3.2.2 COMMUNICATION 6.3.3 SYSTEM
CONFIGURATION 145 6.4 EVALUATION 146 6.4.1 BASIC BEHAVIOR 146 6.4.1.1
INFLUENCE OF NUMBER OF VIDS ON MTFFL 6.4.1.2 INFLUENCE OF TRAFFIC
PARAMETERS ON MTFFL 6.4.1.3 INFLUENCE OF NUMBER OF VIDS ON MNCO 6.4.1.4
INFLUENCE OF NUMBER OF VIDS ON TRACELETS 6.4.2 MULTIPLE SERVERS WITHOUT
SERVER CHANGES 150 6.4.2.1 INFLUENCE OF NUMBER OF SERVERS ON MTFFL
6.4.2.2 INFLUENCE OF NUMBER OF SERVERS ON MNCO 6.4.2.3 INFLUENCE OF
NUMBER OF SERVERS ON TRACELETS 6.4.3 MULTIPLE SERVERS WITH SERVER
CHANGES 152 6.4.3.1 INFLUENCE OF MOVEMENT AND SERVER'CHANGE PROBABILITY
ON MTFFL 6.4.3.2 INFLUENCE OF MOVEMENT AND SERVER CHANGE PROBABILITY ON
TRACELETS 6.5 SUMMARY OF EVALUATION 158 6.5.1 SUMMARY OF RAW RESULTS 158
6.5.2 INFLUENCE OF SYSTEM CONFIGURATION ON PRIVACY METRICS / 158 6.5.3
INFLUENCE OF PARAMETERS ON PRIVACY METRICS /\. 160 6.5.4 DIFFERENT
SYSTEMS: MTFFL VS. TRACELET CARDINALITY 160 6.5.5 DIMENSIONING . 162
CHAPTER 7: CONCLUSIONS AND FURTHER WORK 163 BIBLIOGRAPHY 167 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Hauser, Christian |
author_GND | (DE-588)134283244 |
author_facet | Hauser, Christian |
author_role | aut |
author_sort | Hauser, Christian |
author_variant | c h ch |
building | Verbundindex |
bvnumber | BV023350840 |
ctrlnum | (OCoLC)244011166 (DE-599)BVBBV023350840 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01671nam a2200385 cb4500</leader><controlfield tag="001">BV023350840</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101013 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080618s2007 d||| m||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783938965092</subfield><subfield code="9">978-3-938965-09-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)244011166</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023350840</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hauser, Christian</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)134283244</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting virtual identities in mobile IP-based communication</subfield><subfield code="c">Christian Hauser</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Stuttgart</subfield><subfield code="b">Univ., Inst. für Kommunikationsnetze und Rechnersysteme</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 185 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communication networks and computer engineering</subfield><subfield code="v">98</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Stuttgart, Univ., Diss., 2007</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobiles Internet</subfield><subfield code="0">(DE-588)7627927-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobiles Internet</subfield><subfield code="0">(DE-588)7627927-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communication networks and computer engineering</subfield><subfield code="v">98</subfield><subfield code="w">(DE-604)BV021539246</subfield><subfield code="9">98</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016534457&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016534457</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV023350840 |
illustrated | Illustrated |
index_date | 2024-07-02T21:05:07Z |
indexdate | 2024-07-09T21:16:35Z |
institution | BVB |
isbn | 9783938965092 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016534457 |
oclc_num | 244011166 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-29T DE-83 DE-703 |
owner_facet | DE-91 DE-BY-TUM DE-29T DE-83 DE-703 |
physical | XX, 185 S. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Univ., Inst. für Kommunikationsnetze und Rechnersysteme |
record_format | marc |
series | Communication networks and computer engineering |
series2 | Communication networks and computer engineering |
spelling | Hauser, Christian Verfasser (DE-588)134283244 aut Protecting virtual identities in mobile IP-based communication Christian Hauser Stuttgart Univ., Inst. für Kommunikationsnetze und Rechnersysteme 2007 XX, 185 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Communication networks and computer engineering 98 Zugl.: Stuttgart, Univ., Diss., 2007 Mobiles Internet (DE-588)7627927-3 gnd rswk-swf Identitätsverwaltung (DE-588)7546673-9 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Mobiles Internet (DE-588)7627927-3 s Identitätsverwaltung (DE-588)7546673-9 s DE-604 Communication networks and computer engineering 98 (DE-604)BV021539246 98 HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016534457&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hauser, Christian Protecting virtual identities in mobile IP-based communication Communication networks and computer engineering Mobiles Internet (DE-588)7627927-3 gnd Identitätsverwaltung (DE-588)7546673-9 gnd |
subject_GND | (DE-588)7627927-3 (DE-588)7546673-9 (DE-588)4113937-9 |
title | Protecting virtual identities in mobile IP-based communication |
title_auth | Protecting virtual identities in mobile IP-based communication |
title_exact_search | Protecting virtual identities in mobile IP-based communication |
title_exact_search_txtP | Protecting virtual identities in mobile IP-based communication |
title_full | Protecting virtual identities in mobile IP-based communication Christian Hauser |
title_fullStr | Protecting virtual identities in mobile IP-based communication Christian Hauser |
title_full_unstemmed | Protecting virtual identities in mobile IP-based communication Christian Hauser |
title_short | Protecting virtual identities in mobile IP-based communication |
title_sort | protecting virtual identities in mobile ip based communication |
topic | Mobiles Internet (DE-588)7627927-3 gnd Identitätsverwaltung (DE-588)7546673-9 gnd |
topic_facet | Mobiles Internet Identitätsverwaltung Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016534457&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV021539246 |
work_keys_str_mv | AT hauserchristian protectingvirtualidentitiesinmobileipbasedcommunication |