Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/mobisec/mobisec2009.bht:"
@inproceedings{DBLP:conf/mobisec/BadanPJVWL09, author = {Stephen Badan and Julien Probst and Markus Jaton and Damien Vionnet and Jean{-}Fr{\'{e}}d{\'{e}}ric Wagen and G{\'{e}}rald Litzistorf}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {23--34}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_3}, doi = {10.1007/978-3-642-04434-2\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/BadanPJVWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/BandinelliPVG09, author = {Matteo Bandinelli and Federica Paganelli and Gianluca Vannuccini and Dino Giuli}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {A Context-Aware Security Framework for Next Generation Mobile Networks}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {134--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_12}, doi = {10.1007/978-3-642-04434-2\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/BandinelliPVG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/BrownR09, author = {Andrew Brown and Mark Ryan}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Context-Aware Monitoring of Untrusted Mobile Applications}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {83--96}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_8}, doi = {10.1007/978-3-642-04434-2\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec/BrownR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/DavidP09, author = {Mathieu David and Neeli R. Prasad}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Providing Strong Security and High Privacy in Low-Cost {RFID} Networks}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {172--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_15}, doi = {10.1007/978-3-642-04434-2\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/DavidP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/DojenPC09, author = {Reiner Dojen and Vladimir Pasca and Tom Coffey}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {278--287}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_24}, doi = {10.1007/978-3-642-04434-2\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/DojenPC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/FalkGKL09, author = {Rainer Falk and Christian G{\"{u}}nther and Dirk Kr{\"{o}}selberg and Avi Lior}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Mobile WiMAX Network Security}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {253--264}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_22}, doi = {10.1007/978-3-642-04434-2\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/FalkGKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/FenuS09, author = {Gianni Fenu and Gary Steri}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNs}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {180--189}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_16}, doi = {10.1007/978-3-642-04434-2\_16}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec/FenuS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/GrahamG09, author = {Michelle Graham and David Gray}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {160--171}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_14}, doi = {10.1007/978-3-642-04434-2\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/GrahamG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/HeikkilaG09, author = {Juho Heikkil{\"{a}} and Andrei V. Gurtov}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Filtering {SPAM} in {P2PSIP} Communities with Web of Trust}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {110--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_10}, doi = {10.1007/978-3-642-04434-2\_10}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/HeikkilaG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/HeinT09, author = {Daniel M. Hein and Ronald Toegl}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {46--57}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_5}, doi = {10.1007/978-3-642-04434-2\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/HeinT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/JungSPR09, author = {Chae Duk Jung and Chul Sur and Youngho Park and Kyung Hyune Rhee}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {A Robust Conditional Privacy-Preserving Authentication Protocol in {VANET}}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {35--45}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_4}, doi = {10.1007/978-3-642-04434-2\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/JungSPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/KoskelaT09, author = {Joakim Koskela and Sasu Tarkoma}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Simple Peer-to-Peer {SIP} Privacy}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {226--237}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_20}, doi = {10.1007/978-3-642-04434-2\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/KoskelaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/KrhovjakMZ09, author = {Jan Krhovjak and Vashek Matyas and Jiri Zizkovsky}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Generating Random and Pseudorandom Sequences in Mobile Devices}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {122--133}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_11}, doi = {10.1007/978-3-642-04434-2\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/KrhovjakMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/KuptsovG09, author = {Dmitriy Kuptsov and Andrei V. Gurtov}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {{SAVAH:} Source Address Validation with Host Identity Protocol}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {190--201}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_17}, doi = {10.1007/978-3-642-04434-2\_17}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/KuptsovG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/LaghiAC09, author = {Maria Chiara Laghi and Michele Amoretti and Gianni Conte}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Secure Service Invocation in a Peer-to-Peer Environment Using {JXTA-SOAP}}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {202--213}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_18}, doi = {10.1007/978-3-642-04434-2\_18}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/LaghiAC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/LaponVVND09, author = {Jorn Lapon and Bram Verdegem and Pieter Verhaeghe and Vincent Naessens and Bart De Decker}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Extending the Belgian eID Technology with Mobile Security Functionality}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {97--109}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_9}, doi = {10.1007/978-3-642-04434-2\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/LaponVVND09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/LigattiRS09, author = {Jay Ligatti and Billy Rickey and Nalin Saigal}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {LoPSiL: {A} Location-Based Policy-Specification Language}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {265--277}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_23}, doi = {10.1007/978-3-642-04434-2\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/LigattiRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/MeyersteinCS09, author = {Mike Meyerstein and Inhyok Cha and Yogendra Shah}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine {(M2M)} Advanced Mobile Network Applications}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {214--225}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_19}, doi = {10.1007/978-3-642-04434-2\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/MeyersteinCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/NguyenLM09, author = {Dang{-}Quan Nguyen and Louise Lamont and Peter C. Mason}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {On Trust Evaluation in Mobile Ad Hoc Networks}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {1--13}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_1}, doi = {10.1007/978-3-642-04434-2\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/NguyenLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/NguyenS09, author = {Hoai{-}Nam Nguyen and Yoichi Shinoda}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {On Modeling Viral Diffusion in Heterogeneous Wireless Networks}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {238--252}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_21}, doi = {10.1007/978-3-642-04434-2\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/NguyenS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/ParakhK09, author = {Abhishek Parakh and Subhash C. Kak}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {A Distributed Data Storage Scheme for Sensor Networks}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {14--22}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_2}, doi = {10.1007/978-3-642-04434-2\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/ParakhK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/ShimizuIS09, author = {Takayuki Shimizu and Hisato Iwai and Hideichi Sasaoka}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Information Reconciliation Using Reliability in Secret Key Agreement Scheme with {ESPAR} Antenna}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {148--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_13}, doi = {10.1007/978-3-642-04434-2\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/ShimizuIS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/XueLZZCQ09, author = {Qingshui Xue and Fengying Li and Yuan Zhou and Jiping Zhang and Zhenfu Cao and Haifeng Qian}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {58--70}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_6}, doi = {10.1007/978-3-642-04434-2\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/XueLZZCQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/ZhangAS09, author = {Xinwen Zhang and Onur Acii{\c{c}}mez and Jean{-}Pierre Seifert}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {71--82}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_7}, doi = {10.1007/978-3-642-04434-2\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/ZhangAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobisec/2009, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2}, doi = {10.1007/978-3-642-04434-2}, isbn = {978-3-642-04433-5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.