Published 2012
by Springer Berlin Heidelberg in Berlin, Heidelberg .
Written in English
Edition Notes
Statement | edited by Ramjee Prasad, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, Flaminia L. Luccio |
Series | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering -- 94 |
Contributions | Farkas, Károly, Schmidt, Andreas U., Lioy, Antonio, 1958-, Russello, Giovanni, Luccio, Flaminia L., SpringerLink (Online service) |
The Physical Object | |
---|---|
Format | [electronic resource] : |
ID Numbers | |
Open Library | OL27086851M |
ISBN 10 | 9783642302442 |
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC ) held in Aalborg, Denmark, in May MobiSec was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications. Keywords mobile devices mobile security near field communication smartphones wireless communication. Chapter 1 (Threats, Hacking, and Viruses in Mobile Communications) introduces security and privacy is-sues in mobile communications and basic security requirements of mobile communication systems. Many attacks are described and .
IFIP TC11 18th International Conference on Information Security (SEC) May 26–28, , Athens, Greece Editors: de Capitani di Vimercati, Sabrina, Samarati, Pierangela, Katsikas, . security areas: Information Security, Process Security, Internet Technology Security, Communications Security, Wireless Security, and Physical Secu-rity. The methodology is used by IT consultancies, nancial institutions, government o ces, and legal rmsworldwide because it o ers low-level tests for many international laws on privacy and Size: KB. Nyongesa HO. Ensuring the security and privacy of information in mobile health-care communication systems. S Afr J Sci. ;(9/10), Art. #, 7 pages. doi/sajs. vi9/ The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. Mobile Information Systems publishes original research articles as well as review articles that report the theory and/or application of new ideas and concepts in the field of mobile information systems. About this journal. Editor spotlight. Mobile Information Systems maintains an Editorial Board of practicing researchers from around the world.
The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC ) held in Frankfurt/Main, Germany, in June They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and : Claudio Agostino Ardagna.