1. MobiSec 2009:
Turin,
Italy
Andreas U. Schmidt, Shiguo Lian (Eds.):
Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 17 Springer 2009, ISBN 978-3-642-04433-5
- Dang-Quan Nguyen, Louise Lamont, Peter C. Mason:
On Trust Evaluation in Mobile Ad Hoc Networks.
1-13
- Abhishek Parakh, Subhash Kak:
A Distributed Data Storage Scheme for Sensor Networks.
14-22
- Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf:
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications.
23-34
- Chae Duk Jung, Chul Sur, Youngho Park, Kyung Hyune Rhee:
A Robust Conditional Privacy-Preserving Authentication Protocol in VANET.
35-45
- Daniel M. Hein, Ronald Toegl:
An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response.
46-57
- Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
58-70
- Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms.
71-82
- Andrew Brown, Mark Ryan:
Context-Aware Monitoring of Untrusted Mobile Applications.
83-96
- Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart De Decker:
Extending the Belgian eID Technology with Mobile Security Functionality.
97-109
- Juho Heikkilä, Andrei Gurtov:
Filtering SPAM in P2PSIP Communities with Web of Trust.
110-121
- Jan Krhovjak, Vashek Matyas, Jiri Zizkovsky:
Generating Random and Pseudorandom Sequences in Mobile Devices.
122-133
- Matteo Bandinelli, Federica Paganelli, Gianluca Vannuccini, Dino Giuli:
A Context-Aware Security Framework for Next Generation Mobile Networks.
134-147
- Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka:
Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna.
148-159
- Michelle Graham, David Gray:
Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol.
160-171
- Mathieu David, Neeli R. Prasad:
Providing Strong Security and High Privacy in Low-Cost RFID Networks.
172-179
- Gianni Fenu, Gary Steri:
Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs.
180-189
- Dmitriy Kuptsov, Andrei Gurtov:
SAVAH: Source Address Validation with Host Identity Protocol .
190-201
- Maria Chiara Laghi, Michele Amoretti, Gianni Conte:
Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP.
202-213
- Mike Meyerstein, Inhyok Cha, Yogendra Shah:
Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications.
214-225
- Joakim Koskela, Sasu Tarkoma:
Simple Peer-to-Peer SIP Privacy.
226-237
- Hoai-Nam Nguyen, Yoichi Shinoda:
On Modeling Viral Diffusion in Heterogeneous Wireless Networks .
238-252
- Rainer Falk, Christian Günther, Dirk Kröselberg, Avi Lior:
Mobile WiMAX Network Security.
253-264
- Jay Ligatti, Billy Rickey, Nalin Saigal:
LoPSiL: A Location-Based Policy-Specification Language.
265-277
- Reiner Dojen, Vladimir Pasca, Tom Coffey:
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications.
278-287
Copyright © Tue Mar 16 00:54:15 2010
by Michael Ley (ley@uni-trier.de)