Security and Privacy in Mobile Information and Communication Systems最新文献

筛选
英文 中文
On Trust Evaluation in Mobile Ad Hoc Networks 移动Ad Hoc网络中的信任评估
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_1
Dang-Quan Nguyen, L. Lamont, P. Mason
{"title":"On Trust Evaluation in Mobile Ad Hoc Networks","authors":"Dang-Quan Nguyen, L. Lamont, P. Mason","doi":"10.1007/978-3-642-04434-2_1","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simple Peer-to-Peer SIP Privacy 简单点对点SIP隐私
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_20
J. Koskela, S. Tarkoma
{"title":"Simple Peer-to-Peer SIP Privacy","authors":"J. Koskela, S. Tarkoma","doi":"10.1007/978-3-642-04434-2_20","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_20","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Context-Aware Monitoring of Untrusted Mobile Applications 上下文感知监控不受信任的移动应用程序
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_8
Andrew Brown, M. Ryan
{"title":"Context-Aware Monitoring of Untrusted Mobile Applications","authors":"Andrew Brown, M. Ryan","doi":"10.1007/978-3-642-04434-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Filtering SPAM in P2PSIP Communities with Web of Trust 利用信任网过滤P2PSIP社区中的垃圾邮件
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_10
Juho Heikkilä, A. Gurtov
{"title":"Filtering SPAM in P2PSIP Communities with Web of Trust","authors":"Juho Heikkilä, A. Gurtov","doi":"10.1007/978-3-642-04434-2_10","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130814952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On Modeling Viral Diffusion in Heterogeneous Wireless Networks 异构无线网络中病毒扩散模型研究
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_21
Hoai-Nam Nguyen, Y. Shinoda
{"title":"On Modeling Viral Diffusion in Heterogeneous Wireless Networks","authors":"Hoai-Nam Nguyen, Y. Shinoda","doi":"10.1007/978-3-642-04434-2_21","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_21","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124916547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications 智能卡与机器对机器(M2M)高级移动网络应用中嵌入式安全的安全方面
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_19
M. Meyerstein, Inhyok Cha, Yogendra Shah
{"title":"Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications","authors":"M. Meyerstein, Inhyok Cha, Yogendra Shah","doi":"10.1007/978-3-642-04434-2_19","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_19","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP 使用JXTA-SOAP的对等环境中的安全服务调用
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_18
Maria Chiara Laghi, M. Amoretti, G. Conte
{"title":"Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP","authors":"Maria Chiara Laghi, M. Amoretti, G. Conte","doi":"10.1007/978-3-642-04434-2_18","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_18","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms 构建高效的手机平台完整性测量与认证
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_7
Xinwen Zhang, O. Aciiçmez, Jean-Pierre Seifert
{"title":"Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms","authors":"Xinwen Zhang, O. Aciiçmez, Jean-Pierre Seifert","doi":"10.1007/978-3-642-04434-2_7","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133465658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Mobile WiMAX Network Security 移动WiMAX网络安全
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_22
R. Falk, Christian Günther, Dirk Kröselberg, A. Lior
{"title":"Mobile WiMAX Network Security","authors":"R. Falk, Christian Günther, Dirk Kröselberg, A. Lior","doi":"10.1007/978-3-642-04434-2_22","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_22","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna 基于可靠性的ESPAR天线密钥协议信息协调
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2009-06-03 DOI: 10.1007/978-3-642-04434-2_13
Takayuki Shimizu, H. Iwai, H. Sasaoka
{"title":"Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna","authors":"Takayuki Shimizu, H. Iwai, H. Sasaoka","doi":"10.1007/978-3-642-04434-2_13","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信