9783642210396-3642210392-Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, ... (Lecture Notes in Computer Science, 6633)

Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, ... (Lecture Notes in Computer Science, 6633)

FREE US shipping
Buy

From $16.50

Book details

Summary

Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, ... (Lecture Notes in Computer Science, 6633) (ISBN-13: 9783642210396 and ISBN-10: 3642210392), written by authors Jianying Zhou, Claudio Agostino Ardagna, was published by Springer in 2011. With an overall rating of 4.0 stars, it's a notable title among other Information Management (Processes & Infrastructure, Computer Science, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Algorithms, Programming, History & Culture, Management & Leadership) books. You can easily purchase or rent Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, ... (Lecture Notes in Computer Science, 6633) (Paperback) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book