Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_12
Phillip A. Porras, Hassen Saïdi, V. Yegneswaran
{"title":"An Analysis of the iKee.B iPhone Botnet","authors":"Phillip A. Porras, Hassen Saïdi, V. Yegneswaran","doi":"10.1007/978-3-642-17502-2_12","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133874456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_8
Osama A. Elshakankiry, A. Carpenter, Ning Zhang
{"title":"A Novel Scheme for Supporting Location Authentication of Mobile Nodes","authors":"Osama A. Elshakankiry, A. Carpenter, Ning Zhang","doi":"10.1007/978-3-642-17502-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129075315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_6
S. Al-Kuwari, S. Wolthusen
{"title":"Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks","authors":"S. Al-Kuwari, S. Wolthusen","doi":"10.1007/978-3-642-17502-2_6","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_1
Jan Vossaert, Jorn Lapon, B. Decker, Vincent Naessens
{"title":"Personalized Mobile Services with Lightweight Security in a Sports Association","authors":"Jan Vossaert, Jorn Lapon, B. Decker, Vincent Naessens","doi":"10.1007/978-3-642-17502-2_1","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125825555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_5
E. Magkos, P. Kotzanikolaou
{"title":"Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments","authors":"E. Magkos, P. Kotzanikolaou","doi":"10.1007/978-3-642-17502-2_5","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_3
José María Peribáñez, Alvaro Martínez, Santiago Prieto, N. Gallego
{"title":"XtreemOS-MD SSO - A Plugable, Modular SSO Software for Mobile Grids","authors":"José María Peribáñez, Alvaro Martínez, Santiago Prieto, N. Gallego","doi":"10.1007/978-3-642-17502-2_3","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_2
Julian Jang, Dongxi Liu, S. Nepal, J. Zic
{"title":"User Authentication for Online Applications Using a USB-Based Trust Device","authors":"Julian Jang, Dongxi Liu, S. Nepal, J. Zic","doi":"10.1007/978-3-642-17502-2_2","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_7
M. Werner
{"title":"A Privacy-Enabled Architecture for Location-Based Services","authors":"M. Werner","doi":"10.1007/978-3-642-17502-2_7","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_14
Geoffrey Ottoy, Tom Hamelinckx, B. Preneel, L. D. Strycker, Jean-Pierre Goemaere
{"title":"AES Data Encryption in a ZigBee Network: Software or Hardware?","authors":"Geoffrey Ottoy, Tom Hamelinckx, B. Preneel, L. D. Strycker, Jean-Pierre Goemaere","doi":"10.1007/978-3-642-17502-2_14","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_14","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-27DOI: 10.1007/978-3-642-17502-2_10
Konstantin Shemyak
{"title":"Secure Distribution of the Device Identity in Mobile Access Network","authors":"Konstantin Shemyak","doi":"10.1007/978-3-642-17502-2_10","DOIUrl":"https://doi.org/10.1007/978-3-642-17502-2_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}