Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_2
Abhishek Parakh, S. Kak
{"title":"A Distributed Data Storage Scheme for Sensor Networks","authors":"Abhishek Parakh, S. Kak","doi":"10.1007/978-3-642-04434-2_2","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126030854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_16
G. Fenu, G. Steri
{"title":"Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs","authors":"G. Fenu, G. Steri","doi":"10.1007/978-3-642-04434-2_16","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_16","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_24
R. Dojen, V. Pasca, T. Coffey
{"title":"Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications","authors":"R. Dojen, V. Pasca, T. Coffey","doi":"10.1007/978-3-642-04434-2_24","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_24","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128417964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_3
Stephen Badan, Julien Probst, Markus Jaton, D. Vionnet, J. Wagen, G. Litzistorf
{"title":"A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications","authors":"Stephen Badan, Julien Probst, Markus Jaton, D. Vionnet, J. Wagen, G. Litzistorf","doi":"10.1007/978-3-642-04434-2_3","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_12
Matteo Bandinelli, F. Paganelli, G. Vannuccini, D. Giuli
{"title":"A Context-Aware Security Framework for Next Generation Mobile Networks","authors":"Matteo Bandinelli, F. Paganelli, G. Vannuccini, D. Giuli","doi":"10.1007/978-3-642-04434-2_12","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-9576-6_7
A. Dakhnovich, Dmitrii A. Moskvin, D. Zegzhda
{"title":"A Necessary Condition for Industrial Internet of Things Sustainability","authors":"A. Dakhnovich, Dmitrii A. Moskvin, D. Zegzhda","doi":"10.1007/978-981-16-9576-6_7","DOIUrl":"https://doi.org/10.1007/978-981-16-9576-6_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-15-9609-4_6
Se Won Lee, Donghoon Kim, Sung-Hwa Lim
{"title":"Power-Efficient Big.LITTLE Core Assignment Scheme for Task Graph Based Real-Time Smartphone Applications","authors":"Se Won Lee, Donghoon Kim, Sung-Hwa Lim","doi":"10.1007/978-981-15-9609-4_6","DOIUrl":"https://doi.org/10.1007/978-981-15-9609-4_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121047885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-99-4430-9_13
Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, Chau Nguyen
{"title":"Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN","authors":"Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, Chau Nguyen","doi":"10.1007/978-981-99-4430-9_13","DOIUrl":"https://doi.org/10.1007/978-981-99-4430-9_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-9576-6_12
Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, Li Su
{"title":"A Blockchain-Based Authentication Scheme for 5G Applications","authors":"Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, Li Su","doi":"10.1007/978-981-16-9576-6_12","DOIUrl":"https://doi.org/10.1007/978-981-16-9576-6_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"121 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-15-9609-4_10
Manipriya Sankaranarayanan, C. Mala, S. Mathew
{"title":"Improved Security Schemes for Efficient Traffic Management in Vehicular Ad-Hoc Network","authors":"Manipriya Sankaranarayanan, C. Mala, S. Mathew","doi":"10.1007/978-981-15-9609-4_10","DOIUrl":"https://doi.org/10.1007/978-981-15-9609-4_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}