Security and Privacy in Mobile Information and Communication Systems最新文献

筛选
英文 中文
An Analysis of the iKee.B iPhone Botnet 对kee的分析。B iPhone僵尸网络
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_12
Phillip A. Porras, Hassen Saïdi, V. Yegneswaran
{"title":"An Analysis of the iKee.B iPhone Botnet","authors":"Phillip A. Porras, Hassen Saïdi, V. Yegneswaran","doi":"10.1007/978-3-642-17502-2_12","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133874456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
A Novel Scheme for Supporting Location Authentication of Mobile Nodes 一种支持移动节点位置认证的新方案
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_8
Osama A. Elshakankiry, A. Carpenter, Ning Zhang
{"title":"A Novel Scheme for Supporting Location Authentication of Mobile Nodes","authors":"Osama A. Elshakankiry, A. Carpenter, Ning Zhang","doi":"10.1007/978-3-642-17502-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129075315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks 短程自组织网络中先进秘密跟踪算法
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_6
S. Al-Kuwari, S. Wolthusen
{"title":"Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks","authors":"S. Al-Kuwari, S. Wolthusen","doi":"10.1007/978-3-642-17502-2_6","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Personalized Mobile Services with Lightweight Security in a Sports Association 个性化移动服务与轻量级安全的体育协会
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_1
Jan Vossaert, Jorn Lapon, B. Decker, Vincent Naessens
{"title":"Personalized Mobile Services with Lightweight Security in a Sports Association","authors":"Jan Vossaert, Jorn Lapon, B. Decker, Vincent Naessens","doi":"10.1007/978-3-642-17502-2_1","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125825555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments 增强普适计算环境下保护隐私的访问控制
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_5
E. Magkos, P. Kotzanikolaou
{"title":"Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments","authors":"E. Magkos, P. Kotzanikolaou","doi":"10.1007/978-3-642-17502-2_5","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
XtreemOS-MD SSO - A Plugable, Modular SSO Software for Mobile Grids XtreemOS-MD单点登录-一个可插拔的,模块化的单点登录软件的移动电网
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_3
José María Peribáñez, Alvaro Martínez, Santiago Prieto, N. Gallego
{"title":"XtreemOS-MD SSO - A Plugable, Modular SSO Software for Mobile Grids","authors":"José María Peribáñez, Alvaro Martínez, Santiago Prieto, N. Gallego","doi":"10.1007/978-3-642-17502-2_3","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Authentication for Online Applications Using a USB-Based Trust Device 基于usb信任设备的在线应用用户认证
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_2
Julian Jang, Dongxi Liu, S. Nepal, J. Zic
{"title":"User Authentication for Online Applications Using a USB-Based Trust Device","authors":"Julian Jang, Dongxi Liu, S. Nepal, J. Zic","doi":"10.1007/978-3-642-17502-2_2","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Privacy-Enabled Architecture for Location-Based Services 基于位置的服务的隐私支持架构
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_7
M. Werner
{"title":"A Privacy-Enabled Architecture for Location-Based Services","authors":"M. Werner","doi":"10.1007/978-3-642-17502-2_7","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
AES Data Encryption in a ZigBee Network: Software or Hardware? ZigBee网络中的AES数据加密:软件还是硬件?
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_14
Geoffrey Ottoy, Tom Hamelinckx, B. Preneel, L. D. Strycker, Jean-Pierre Goemaere
{"title":"AES Data Encryption in a ZigBee Network: Software or Hardware?","authors":"Geoffrey Ottoy, Tom Hamelinckx, B. Preneel, L. D. Strycker, Jean-Pierre Goemaere","doi":"10.1007/978-3-642-17502-2_14","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_14","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure Distribution of the Device Identity in Mobile Access Network 移动接入网中设备身份的安全分配
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2010-05-27 DOI: 10.1007/978-3-642-17502-2_10
Konstantin Shemyak
{"title":"Secure Distribution of the Device Identity in Mobile Access Network","authors":"Konstantin Shemyak","doi":"10.1007/978-3-642-17502-2_10","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信