Editors:
State-of-the-art research
Fast-track conference proceedings
Unique visibility
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6633)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice
Conference proceedings info: WISTP 2011.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (28 papers)
-
Front Matter
-
Keynote Speech
-
Mobile Authentication and Access Control
-
Security Attacks
Other Volumes
-
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
About this book
Keywords
- Web of trust
- authorization
- differential cryptanalysis
- semantic firewall
- wireless mesh networks
- algorithm analysis and problem complexity
Editors and Affiliations
-
Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Crema (CR), Italy
Claudio A. Ardagna
-
Institute for Infocomm Research, South Tower, Singapore
Jianying Zhou
Bibliographic Information
Book Title: Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication
Book Subtitle: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings
Editors: Claudio A. Ardagna, Jianying Zhou
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-21040-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: IFIP International Federation for Information Processing 2011
Softcover ISBN: 978-3-642-21039-6Published: 12 May 2011
eBook ISBN: 978-3-642-21040-2Published: 03 June 2011
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 392
Topics: Computer Communication Networks, IT Operations, Cryptology, Algorithms, Data and Information Security, Computers and Society