Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010063741 | TK6570.M6 S42 2004 | Open Access Book | Book | Searching... |
Searching... | 30000010178837 | TK6570.M6 S42 2004 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Over the last two decades, mobile telecommunications has grown dramatically, from a small niche technology to a massive industry. Mobile telephones are now ubiquitous, and the divisions between PCs, PDAs, mobile telephones and other mobile devices are becoming increasingly blurred. Against this background, the security of information of both the devices themselves, and the information handled by these devices, is becoming ever more important.
Security for Mobility pulls together up to the minute research from an international group of academics and professionals working in industry. The main text of the book is divided into five parts - underlying technologies; network security; mobile code issues; application security; and the future. Each chapter of the book is the collaboration of different authors, including many of the leading European experts currently working within the field. Thus each chapter is self-contained and can be read independently, although there are many relationships between the various chapters.
The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.
are many relationships between the various chapters.The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.
are many relationships between the various chapters.The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.
are many relationships between the various chapters.The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.
Table of Contents
Underlying Technologies |
Cryptography for Mobile Security |
PKI in Mobile Systems |
The Personal PKI |
The Smartcard as a Mobile Security Device |
Security Mobile Tokens _ The Future |
Network Security |
UMTS Security |
Securing Network Access in Future Mobile Systems |
Public Key Based Network Access |
Security in Personal Area Networks |
Towards the Security of Routing in Ad Hoc Networks |
Security Issues in Mobile IPv6 Networks |
Mobile Code Issues |
Security for Agent Systems and Mobile Agents |
Security Issues for Downloaded Code in Mobile Phones |
Application Security |
Secure Mobile Commerce |
Securing the Delivery of Digital Content Over the Internet |
Security for Future Standardisation |
DRM |
The Future |
Pioneering Advanced |
Mobile Privacy and Security |