Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

Front Cover
Shiguo Lian
Springer Science & Business Media, Sep 19, 2009 - Computers - 289 pages

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

On Trust Evaluation in Mobile Ad Hoc Networks
1
A Distributed Data Storage Scheme for Sensor Networks
14
A Robust Conditional PrivacyPreserving Authentication Protocol
35
An ECDLPBased Threshold Proxy Signature Scheme Using
58
Building Efficient Integrity Measurement and Attestation for Mobile
71
Extending the Belgian eID Technology with Mobile Security
97
Filtering SPAM in P2PSIP Communities with Web of Trust
110
A ContextAware Security Framework for Next Generation Mobile
134
Safe Fault Tolerant and CaptureResilient Environmental Parameters
180
Source Address Validation with Host Identity Protocol
190
Secure Service Invocation in a PeertoPeer Environment Using
202
Security Aspects of Smart Cards vs Embedded Security
214
Simple PeertoPeer SIP Privacy
226
On Modeling Viral Diffusion in Heterogeneous Wireless Networks
238
Mobile WiMAX Network Security
253
A LocationBased PolicySpecification Language
265

Information Reconciliation Using Reliability in Secret Key Agreement
148
Protecting Privacy and Securing the Gathering of Location
160
Providing Strong Security and High Privacy in LowCost RFID
172
Impersonation Attacks on a Mobile Security Protocol for EndtoEnd
278
Copyright

Other editions - View all

Common terms and phrases