Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_1
Dang-Quan Nguyen, L. Lamont, P. Mason
{"title":"On Trust Evaluation in Mobile Ad Hoc Networks","authors":"Dang-Quan Nguyen, L. Lamont, P. Mason","doi":"10.1007/978-3-642-04434-2_1","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_20
J. Koskela, S. Tarkoma
{"title":"Simple Peer-to-Peer SIP Privacy","authors":"J. Koskela, S. Tarkoma","doi":"10.1007/978-3-642-04434-2_20","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_20","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_8
Andrew Brown, M. Ryan
{"title":"Context-Aware Monitoring of Untrusted Mobile Applications","authors":"Andrew Brown, M. Ryan","doi":"10.1007/978-3-642-04434-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_10
Juho Heikkilä, A. Gurtov
{"title":"Filtering SPAM in P2PSIP Communities with Web of Trust","authors":"Juho Heikkilä, A. Gurtov","doi":"10.1007/978-3-642-04434-2_10","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130814952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_21
Hoai-Nam Nguyen, Y. Shinoda
{"title":"On Modeling Viral Diffusion in Heterogeneous Wireless Networks","authors":"Hoai-Nam Nguyen, Y. Shinoda","doi":"10.1007/978-3-642-04434-2_21","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_21","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124916547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_19
M. Meyerstein, Inhyok Cha, Yogendra Shah
{"title":"Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications","authors":"M. Meyerstein, Inhyok Cha, Yogendra Shah","doi":"10.1007/978-3-642-04434-2_19","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_19","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_18
Maria Chiara Laghi, M. Amoretti, G. Conte
{"title":"Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP","authors":"Maria Chiara Laghi, M. Amoretti, G. Conte","doi":"10.1007/978-3-642-04434-2_18","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_18","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_7
Xinwen Zhang, O. Aciiçmez, Jean-Pierre Seifert
{"title":"Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms","authors":"Xinwen Zhang, O. Aciiçmez, Jean-Pierre Seifert","doi":"10.1007/978-3-642-04434-2_7","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133465658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_22
R. Falk, Christian Günther, Dirk Kröselberg, A. Lior
{"title":"Mobile WiMAX Network Security","authors":"R. Falk, Christian Günther, Dirk Kröselberg, A. Lior","doi":"10.1007/978-3-642-04434-2_22","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_22","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-03DOI: 10.1007/978-3-642-04434-2_13
Takayuki Shimizu, H. Iwai, H. Sasaoka
{"title":"Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna","authors":"Takayuki Shimizu, H. Iwai, H. Sasaoka","doi":"10.1007/978-3-642-04434-2_13","DOIUrl":"https://doi.org/10.1007/978-3-642-04434-2_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}