Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2009
|
Ausgabe: | 1st ed. 2009 |
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
17 |
Schlagworte: | |
Online-Zugang: | DE-355 URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (X, 289 Seiten) |
ISBN: | 9783642044342 |
ISSN: | 1867-822X |
DOI: | 10.1007/978-3-642-04434-2 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV050122715 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 250115s2009 xx o|||| 00||| eng d | ||
020 | |a 9783642044342 |9 978-3-642-04434-2 | ||
024 | 7 | |a 10.1007/978-3-642-04434-2 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-642-04434-2 | ||
035 | |a (OCoLC)1492129282 | ||
035 | |a (DE-599)BVBBV050122715 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 005.824 |2 23 | |
245 | 1 | 0 | |a Security and Privacy in Mobile Information and Communication Systems |b First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers |c edited by Shiguo Lian |
250 | |a 1st ed. 2009 | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2009 | |
300 | |a 1 Online-Ressource (X, 289 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 17 |x 1867-822X | |
505 | 8 | |a MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Programming Techniques | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer and Information Systems Applications | |
650 | 4 | |a System Performance and Evaluation | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Information storage and retrieval systems | |
650 | 4 | |a Computer programming | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Information theory | |
650 | 4 | |a Application software | |
650 | 4 | |a Electronic digital computers / Evaluation | |
700 | 1 | |a Lian, Shiguo |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642044335 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642044830 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-04434-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-SCS | ||
940 | 1 | |q ZDB-2-SCS_2009 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035459585 | |
966 | e | |u https://doi.org/10.1007/978-3-642-04434-2 |l DE-355 |p ZDB-2-SCS |q UBR Paketkauf 2024 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1823676063463505920 |
---|---|
adam_text | |
any_adam_object | |
author2 | Lian, Shiguo |
author2_role | edt |
author2_variant | s l sl |
author_facet | Lian, Shiguo |
building | Verbundindex |
bvnumber | BV050122715 |
collection | ZDB-1-SCS |
contents | MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications |
ctrlnum | (ZDB-2-SCS)978-3-642-04434-2 (OCoLC)1492129282 (DE-599)BVBBV050122715 |
dewey-full | 005.824 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.824 |
dewey-search | 005.824 |
dewey-sort | 15.824 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-04434-2 |
edition | 1st ed. 2009 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV050122715</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">250115s2009 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642044342</subfield><subfield code="9">978-3-642-04434-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-04434-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-642-04434-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1492129282</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050122715</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.824</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Privacy in Mobile Information and Communication Systems</subfield><subfield code="b">First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers</subfield><subfield code="c">edited by Shiguo Lian</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2009</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 289 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">17</subfield><subfield code="x">1867-822X</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System Performance and Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic digital computers / Evaluation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lian, Shiguo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642044335</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642044830</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-04434-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2009</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035459585</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-04434-2</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">UBR Paketkauf 2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050122715 |
illustrated | Not Illustrated |
indexdate | 2025-02-10T13:10:23Z |
institution | BVB |
isbn | 9783642044342 |
issn | 1867-822X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035459585 |
oclc_num | 1492129282 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (X, 289 Seiten) |
psigel | ZDB-1-SCS ZDB-2-SCS_2009 ZDB-2-SCS UBR Paketkauf 2024 |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series2 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spelling | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers edited by Shiguo Lian 1st ed. 2009 Berlin, Heidelberg Springer Berlin Heidelberg 2009 1 Online-Ressource (X, 289 Seiten) txt rdacontent c rdamedia cr rdacarrier Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 17 1867-822X MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications Cryptology Information Storage and Retrieval Programming Techniques Data Structures and Information Theory Computer and Information Systems Applications System Performance and Evaluation Cryptography Data encryption (Computer science) Information storage and retrieval systems Computer programming Data structures (Computer science) Information theory Application software Electronic digital computers / Evaluation Lian, Shiguo edt Erscheint auch als Druck-Ausgabe 9783642044335 Erscheint auch als Druck-Ausgabe 9783642044830 https://doi.org/10.1007/978-3-642-04434-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications Cryptology Information Storage and Retrieval Programming Techniques Data Structures and Information Theory Computer and Information Systems Applications System Performance and Evaluation Cryptography Data encryption (Computer science) Information storage and retrieval systems Computer programming Data structures (Computer science) Information theory Application software Electronic digital computers / Evaluation |
title | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers |
title_auth | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers |
title_exact_search | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers |
title_full | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers edited by Shiguo Lian |
title_fullStr | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers edited by Shiguo Lian |
title_full_unstemmed | Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers edited by Shiguo Lian |
title_short | Security and Privacy in Mobile Information and Communication Systems |
title_sort | security and privacy in mobile information and communication systems first international icst conference mobisec 2009 turin italy june 3 5 2009 revised selected papers |
title_sub | First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers |
topic | Cryptology Information Storage and Retrieval Programming Techniques Data Structures and Information Theory Computer and Information Systems Applications System Performance and Evaluation Cryptography Data encryption (Computer science) Information storage and retrieval systems Computer programming Data structures (Computer science) Information theory Application software Electronic digital computers / Evaluation |
topic_facet | Cryptology Information Storage and Retrieval Programming Techniques Data Structures and Information Theory Computer and Information Systems Applications System Performance and Evaluation Cryptography Data encryption (Computer science) Information storage and retrieval systems Computer programming Data structures (Computer science) Information theory Application software Electronic digital computers / Evaluation |
url | https://doi.org/10.1007/978-3-642-04434-2 |
work_keys_str_mv | AT lianshiguo securityandprivacyinmobileinformationandcommunicationsystemsfirstinternationalicstconferencemobisec2009turinitalyjune352009revisedselectedpapers |