1 option
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings / edited by Claudio Agostino Ardagna, Jianying Zhou.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 6633.
- Security and Cryptology ; 6633
- Language:
- English
- Subjects (All):
- Computer networks.
- Management information systems.
- Computer science.
- Data encryption (Computer science).
- Algorithms.
- Computer security.
- Computers and civilization.
- Computer Communication Networks.
- Management of Computing and Information Systems.
- Cryptology.
- Algorithm Analysis and Problem Complexity.
- Systems and Data Security.
- Computers and Society.
- Local Subjects:
- Computer Communication Networks.
- Management of Computing and Information Systems.
- Cryptology.
- Algorithm Analysis and Problem Complexity.
- Systems and Data Security.
- Computers and Society.
- Physical Description:
- 1 online resource (XIII, 392 pages).
- Edition:
- First edition 2011.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
- System Details:
- text file PDF
- Summary:
- This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-642-21040-2
- 9783642210402
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.