|
|
|
|
LEADER |
02341nmm a2200421 u 4500 |
001 |
EB000389405 |
003 |
EBX01000000000000000242458 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642302442
|
100 |
1 |
|
|a Prasad, Ramjee
|e [editor]
|
245 |
0 |
0 |
|a Security and Privacy in Mobile Information and Communication Systems
|h Elektronische Ressource
|b Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers
|c edited by Ramjee Prasad, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, Flaminia Luccio
|
250 |
|
|
|a 1st ed. 2012
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012, 2012
|
300 |
|
|
|a X, 185 p. 46 illus. in color
|b online resource
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Information Storage and Retrieval
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Information storage and retrieval systems
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Farkas, Károly
|e [editor]
|
700 |
1 |
|
|a Schmidt, Andreas U.
|e [editor]
|
700 |
1 |
|
|a Lioy, Antonio
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
|
028 |
5 |
0 |
|a 10.1007/978-3-642-30244-2
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-30244-2?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 004.6
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization
|