Get Free Shipping on orders over $79
Security and Privacy in Mobile Information and Communication Systems : First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers - Andreas U. Schmidt

Security and Privacy in Mobile Information and Communication Systems

First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers

By: Andreas U. Schmidt, Shiguo Lian

eText | 19 September 2009 | Edition Number 1

At a Glance

eText


$84.99

or 4 interest-free payments of $21.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.
MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications
on
Desktop
Tablet
Mobile

More in Databases

China's Megatrends : The 8 Pillars of a New Society - John Naisbitt

eBOOK

AI-Powered Search - Trey Grainger

eBOOK

Conquering the Decision Abyss - Keith Hartley

eBOOK

RRP $15.39

$14.99

Transformers in Action - Nicole Koenigstein

eBOOK

Investing for Programmers - Stefan Papp

eBOOK

Birding with AI : Concepts and Projects for Ornithology - Ronald T. Kneusel

eBOOK