Skip to main content
main-content

Über dieses Buch

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization.

Inhaltsverzeichnis

Frontmatter

Conference Papers

2012 | OriginalPaper | Buchkapitel

Android Market Analysis with Activation Patterns

Peter Teufl, Stefan Kraxberger, Clemens Orthacker, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber

2012 | OriginalPaper | Buchkapitel

Gesture Authentication with Touch Input for Mobile Devices

Yuan Niu, Hao Chen

2012 | OriginalPaper | Buchkapitel

A Context-Aware Privacy Policy Language for Controlling Access to Context Information of Mobile Users

Alireza Behrooz, Alisa Devlic

2012 | OriginalPaper | Buchkapitel

Android Security Permissions – Can We Trust Them?

Clemens Orthacker, Peter Teufl, Stefan Kraxberger, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber

2012 | OriginalPaper | Buchkapitel

Private Pooling: A Privacy-Preserving Approach for Mobile Collaborative Sensing

Kevin Wiesner, Michael Dürr, Markus Duchon

2012 | OriginalPaper | Buchkapitel

Agent Based Middleware for Maintaining User Privacy in IPTV Recommender Services

Ahmed M. Elmisery, Dmitri Botvich

2012 | OriginalPaper | Buchkapitel

Privacy Enhanced Device Access

Geir M. Køien

2012 | OriginalPaper | Buchkapitel

Energy Efficiency Measurements of Mobile Virtualization Systems

Marius Marcu, Dacian Tudor

2012 | OriginalPaper | Buchkapitel

Digital Holography for Security Applications

Roberto Maurizio Pellegrini, Samuela Persia, Silvello Betti

2012 | OriginalPaper | Buchkapitel

Formal Security Analysis of OpenID with GBA Protocol

Abu Shohel Ahmed, Peeter Laud

2012 | OriginalPaper | Buchkapitel

Can a Mobile Cloud Be More Trustworthy than a Traditional Cloud?

Mufajjul Ali

2012 | OriginalPaper | Buchkapitel

Fingerprint Recognition with Embedded Cameras on Mobile Phones

Mohammad Omar Derawi, Bian Yang, Christoph Busch

2012 | OriginalPaper | Buchkapitel

Policy Driven Remote Attestation

Anandha Gopalan, Vaibhav Gowadia, Enrico Scalavino, Emil Lupu

2012 | OriginalPaper | Buchkapitel

ID-Based Deniable Authentication Protocol Suitable for Mobile Devices

Jayaprakash Kar

2012 | OriginalPaper | Buchkapitel

Mobile Security with Location-Aware Role-Based Access Control

Nils Ulltveit-Moe, Vladimir Oleshchuk

Backmatter

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!

Bildnachweise