| 000 | 03112nam a22005655i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-33392-7 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083327.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120820s2012 gw | s |||| 0|eng d | ||
| 020 |
_a9783642333927 _9978-3-642-33392-7 |
||
| 024 | 7 |
_a10.1007/978-3-642-33392-7 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aUTN _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aSchmidt, Andreas U. _eeditor. |
|
| 245 | 1 | 0 |
_aSecurity and Privacy in Mobile Information and Communication Systems _h[electronic resource] : _b4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers / _cedited by Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
| 300 |
_aVIII, 130 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v107 |
|
| 520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aComputer network architectures. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aComputer System Implementation. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
| 650 | 2 | 4 | _aComputers and Society. |
| 700 | 1 |
_aRussello, Giovanni. _eeditor. |
|
| 700 | 1 |
_aKrontiris, Ioannis. _eeditor. |
|
| 700 | 1 |
_aLian, Shiguo. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642333910 |
| 830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v107 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-33392-7 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c103629 _d103629 |
||