Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings / [electronic resource] :
edited by Claudio Agostino Ardagna, Jianying Zhou.
- 1st ed. 2011.
- XIII, 392 p. online resource.
- Security and Cryptology, 6633 2946-1863 ; .
- Security and Cryptology, 6633 .
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.
9783642210402
10.1007/978-3-642-21040-2 doi
Computer networks .
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Algorithms.
Data protection.
Computers and civilization.
Computer Communication Networks.
IT Operations.
Cryptology.
Algorithms.
Data and Information Security.
Computers and Society.
TK5105.5-5105.9
004.6
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.
9783642210402
10.1007/978-3-642-21040-2 doi
Computer networks .
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Algorithms.
Data protection.
Computers and civilization.
Computer Communication Networks.
IT Operations.
Cryptology.
Algorithms.
Data and Information Security.
Computers and Society.
TK5105.5-5105.9
004.6