Advertisement

Security and Privacy in Mobile Information and Communication Systems

Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

  • Andreas U. Schmidt
  • Giovanni Russello
  • Antonio Lioy
  • Neeli R. Prasad
  • Shiguo Lian
Conference proceedings MobiSec 2010

Table of contents

  1. Front Matter
  2. Session 1: Identity and Privacy I

    1. Front Matter
      Pages 1-1
    2. Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens
      Pages 3-14
    3. Julian Jang, Dongxi Liu, Surya Nepal, John Zic
      Pages 15-26
    4. José María Peribáñez, Alvaro Martínez, Santiago Prieto, Noé Gallego
      Pages 27-38
  3. Session 2: Identity and Privacy II

    1. Front Matter
      Pages 39-39
    2. Pieter Verhaeghe, Kristof Verslype, Jorn Lapon, Vincent Naessens, Bart De Decker
      Pages 41-52
    3. Emmanouil Magkos, Panayiotis Kotzanikolaou
      Pages 53-64
  4. Session 3: Location and Tracking

    1. Front Matter
      Pages 65-65
    2. Saif Al-Kuwari, Stephen D. Wolthusen
      Pages 67-79
    3. Osama Elshakankiry, Andy Carpenter, Ning Zhang
      Pages 91-102
  5. Session 4: Ubiquitous Security

    1. Front Matter
      Pages 103-103
    2. Christophe Huygens, Nelson Matthys, Wouter Joosen
      Pages 105-116
    3. Bai Li, Lynn Margaret Batten, Robin Doss
      Pages 127-138
  6. Session 5: Devices

    1. Front Matter
      Pages 139-139
    2. Phillip Porras, Hassen Saïdi, Vinod Yegneswaran
      Pages 141-152
    3. Daniel Fuentes, Juan A. Álvarez, Juan A. Ortega, Luis González-Abril, Francisco Velasco
      Pages 153-162
    4. Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere
      Pages 163-173
  7. Back Matter

About these proceedings

Introduction

MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

Keywords

Bridge authentication context-aware systems hardware security location based systems mobile devices next-generation internet privacy security smart homes systems

Editors and affiliations

  • Andreas U. Schmidt
    • 1
  • Giovanni Russello
    • 2
  • Antonio Lioy
    • 3
  • Neeli R. Prasad
    • 4
  • Shiguo Lian
    • 5
  1. 1.novalyst ITKarbenGermany
  2. 2.Create-Net Research ConsortiumPovoItaly
  3. 3.Politecnico di TorinoDipartimento di Automatica e InformaticaTorinoItaly
  4. 4.Center for TeleInFrastrukturAalborg UniversityAalborg EastDenmark
  5. 5.France Telecom R&D (Orange Labs) , Haidian DistrictBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-17502-2
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17501-5
  • Online ISBN 978-3-642-17502-2
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering