Security and Privacy in Mobile Information and Communication Systems最新文献

筛选
英文 中文
A Distributed Data Storage Scheme for Sensor Networks 传感器网络的分布式数据存储方案
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_2
Abhishek Parakh, S. Kak
{"title":"A Distributed Data Storage Scheme for Sensor Networks","authors":"Abhishek Parakh, S. Kak","doi":"10.1007/978-3-642-04434-2_2","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126030854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs 基于WSNs的安全、容错和捕获弹性环境参数测量
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_16
G. Fenu, G. Steri
{"title":"Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs","authors":"G. Fenu, G. Steri","doi":"10.1007/978-3-642-04434-2_16","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_16","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications 端到端通信移动安全协议的模拟攻击
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_24
R. Dojen, V. Pasca, T. Coffey
{"title":"Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications","authors":"R. Dojen, V. Pasca, T. Coffey","doi":"10.1007/978-3-642-04434-2_24","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_24","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128417964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications 一个基于富客户端-服务器的框架,方便移动应用程序的安全和管理
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_3
Stephen Badan, Julien Probst, Markus Jaton, D. Vionnet, J. Wagen, G. Litzistorf
{"title":"A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications","authors":"Stephen Badan, Julien Probst, Markus Jaton, D. Vionnet, J. Wagen, G. Litzistorf","doi":"10.1007/978-3-642-04434-2_3","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Context-Aware Security Framework for Next Generation Mobile Networks 下一代移动网络环境感知安全框架
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_12
Matteo Bandinelli, F. Paganelli, G. Vannuccini, D. Giuli
{"title":"A Context-Aware Security Framework for Next Generation Mobile Networks","authors":"Matteo Bandinelli, F. Paganelli, G. Vannuccini, D. Giuli","doi":"10.1007/978-3-642-04434-2_12","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Necessary Condition for Industrial Internet of Things Sustainability 工业物联网可持续发展的必要条件
Security and Privacy in Mobile Information and Communication Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-9576-6_7
A. Dakhnovich, Dmitrii A. Moskvin, D. Zegzhda
{"title":"A Necessary Condition for Industrial Internet of Things Sustainability","authors":"A. Dakhnovich, Dmitrii A. Moskvin, D. Zegzhda","doi":"10.1007/978-981-16-9576-6_7","DOIUrl":"https://doi.org/10.1007/978-981-16-9576-6_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power-Efficient Big.LITTLE Core Assignment Scheme for Task Graph Based Real-Time Smartphone Applications 低功耗大。基于任务图的实时智能手机应用的LITTLE核心分配方案
Security and Privacy in Mobile Information and Communication Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-15-9609-4_6
Se Won Lee, Donghoon Kim, Sung-Hwa Lim
{"title":"Power-Efficient Big.LITTLE Core Assignment Scheme for Task Graph Based Real-Time Smartphone Applications","authors":"Se Won Lee, Donghoon Kim, Sung-Hwa Lim","doi":"10.1007/978-981-15-9609-4_6","DOIUrl":"https://doi.org/10.1007/978-981-15-9609-4_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121047885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN 利用机器学习检测SDN中时序侧信道攻击
Security and Privacy in Mobile Information and Communication Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-4430-9_13
Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, Chau Nguyen
{"title":"Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN","authors":"Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, Chau Nguyen","doi":"10.1007/978-981-99-4430-9_13","DOIUrl":"https://doi.org/10.1007/978-981-99-4430-9_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Authentication Scheme for 5G Applications 基于区块链的5G应用认证方案
Security and Privacy in Mobile Information and Communication Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-9576-6_12
Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, Li Su
{"title":"A Blockchain-Based Authentication Scheme for 5G Applications","authors":"Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, Li Su","doi":"10.1007/978-981-16-9576-6_12","DOIUrl":"https://doi.org/10.1007/978-981-16-9576-6_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"121 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Security Schemes for Efficient Traffic Management in Vehicular Ad-Hoc Network 车载Ad-Hoc网络中高效交通管理的改进安全方案
Security and Privacy in Mobile Information and Communication Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-15-9609-4_10
Manipriya Sankaranarayanan, C. Mala, S. Mathew
{"title":"Improved Security Schemes for Efficient Traffic Management in Vehicular Ad-Hoc Network","authors":"Manipriya Sankaranarayanan, C. Mala, S. Mathew","doi":"10.1007/978-981-15-9609-4_10","DOIUrl":"https://doi.org/10.1007/978-981-15-9609-4_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信