Security for mobility

C. Mitchell
{"title":"Security for mobility","authors":"C. Mitchell","doi":"10.1049/ECEJ:20020508","DOIUrl":null,"url":null,"abstract":"* Part I: Underlying technologies * Chapter 1: Cryptography for mobile security * Chapter 2: PKI in mobile systems * Chapter 3: The personal PKI * Chapter 4: The smartcard as a mobile security device * Chapter 5: Secure mobile tokens - the future * Part II: Network security * Chapter 6: UMTS security * Chapter 7: Securing network access in future mobile systems * Chapter 8: Public key based network access * Chapter 9: Security in personal area networks * Chapter 10: Towards the security of routing in ad hoc networks * Chapter 11: Security issues in a MobileIPv6 network * Part III: Mobile code issues * Chapter 12: Security for agent systems and mobile agents * Chapter 13: Security issues for downloaded code in mobile phones * Part IV: Application security * Chapter 14: Secure mobile commerce * Chapter 15: Securing the delivery of digital content over the Internet * Chapter 16: Security for future standardised DRM * Part V: The future * Chapter 17: Pioneering advanced mobile privacy and security","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics & Communication Engineering Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/ECEJ:20020508","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

* Part I: Underlying technologies * Chapter 1: Cryptography for mobile security * Chapter 2: PKI in mobile systems * Chapter 3: The personal PKI * Chapter 4: The smartcard as a mobile security device * Chapter 5: Secure mobile tokens - the future * Part II: Network security * Chapter 6: UMTS security * Chapter 7: Securing network access in future mobile systems * Chapter 8: Public key based network access * Chapter 9: Security in personal area networks * Chapter 10: Towards the security of routing in ad hoc networks * Chapter 11: Security issues in a MobileIPv6 network * Part III: Mobile code issues * Chapter 12: Security for agent systems and mobile agents * Chapter 13: Security issues for downloaded code in mobile phones * Part IV: Application security * Chapter 14: Secure mobile commerce * Chapter 15: Securing the delivery of digital content over the Internet * Chapter 16: Security for future standardised DRM * Part V: The future * Chapter 17: Pioneering advanced mobile privacy and security
移动安全
*第一部分:底层技术*第1章:移动安全加密*第二章:PKI在移动系统*第三章:个人PKI *第四章:智能卡作为移动安全设备*第五章“安全移动令牌-未来*第二部分:网络安全*第六章:UMTS安全*第七章:确保在未来移动通信系统网络访问*第八章:基于公钥的网络访问*第九章:安全在个人区域网络*第十章:对在ad hoc网络路由的安全*第十一章:安全问题在MobileIPv6网络*第三部分:移动代码问题*第十二章:安全代理系统和移动代理*第13章:安全问题在手机下载代码*第四部分:应用程序安全性*第十四章:安全的移动商务*第十五章:通过互联网获得数字内容的交付*第十六章:安全未来标准化DRM *第五部分:未来* 17章开拓先进的移动隐私和安全
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信