Secure and efficient public key management in next generation mobile networks (English)
- New search for: Han, Kyusuk
- New search for: Mun, Hyeran
- New search for: Shon, Taeshik
- New search for: Yeun, Chan Yeob
- New search for: Park, James J. (Jong Hyuk)
- New search for: Han, Kyusuk
- New search for: Mun, Hyeran
- New search for: Shon, Taeshik
- New search for: Yeun, Chan Yeob
- New search for: Park, James J. (Jong Hyuk)
In:
Personal and Ubiquitous Computing
;
16
, 6
; 677-685
;
2011
-
ISSN:
- Article (Journal) / Print
-
Title:Secure and efficient public key management in next generation mobile networks
-
Contributors:Han, Kyusuk ( author ) / Mun, Hyeran ( author ) / Shon, Taeshik ( author ) / Yeun, Chan Yeob ( author ) / Park, James J. (Jong Hyuk) ( author )
-
Published in:Personal and Ubiquitous Computing ; 16, 6 ; 677-685
-
Publisher:
- New search for: Springer-Verlag
- New search for: Springer-Verl.
-
Place of publication:London
-
Publication date:2011
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 53.76 / 54.26
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 16, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 611
-
Guest editorial: Theme issue on smartphone applications and services for pervasive computingPark, James J. (Jong Hyuk) / Chao, Han-Chieh / Shon, Taeshik / Denko, Mieso et al. | 2011
- 613
-
my2cents: enabling research on consumer-product interactionKarpischek, Stephan / Michahelles, Florian / Fleisch, Elgar et al. | 2011
- 623
-
Sketching up the world: in situ authoring for mobile Augmented RealityLanglotz, Tobias / Mooslechner, Stefan / Zollmann, Stefanie / Degendorfer, Claus / Reitmayr, Gerhard / Schmalstieg, Dieter et al. | 2011
- 631
-
An Android runtime security policy enforcement frameworkBanuri, Hammad / Alam, Masoom / Khan, Shahryar / Manzoor, Jawad / Ali, Bahar / Khan, Yasar / Yaseen, Mohsin / Tahir, Mir Nauman / Ali, Tamleek / Alam, Quratulain et al. | 2011
- 643
-
Resuscitating privacy-preserving mobile payment with customer in complete controlKonidala, Divyan Munirathnam / Dwijaksara, Made Harta / Kim, Kwangjo / Lee, Dongman / Lee, Byoungcheon / Kim, Daeyoung / Kim, Soontae et al. | 2011
- 655
-
PowerPedia: changing energy usage with the help of a community-based smartphone applicationWeiss, Markus / Staake, Thorsten / Mattern, Friedemann / Fleisch, Elgar et al. | 2011
- 665
-
Mobile exploration of geotagged photographsRost, Mattias / Cramer, Henriette / Holmquist, Lars Erik et al. | 2011
- 677
-
Secure and efficient public key management in next generation mobile networksHan, Kyusuk / Mun, Hyeran / Shon, Taeshik / Yeun, Chan Yeob / Park, James J. (Jong Hyuk) et al. | 2011
- 687
-
A smartphone watch for mobile surveillance serviceChung, Won-Ho et al. | 2011
- 697
-
Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16jLee, Yong / Lee, Goo Yeon / Kim, Hwa Jong / Jeong, Choong Kyo et al. | 2011
- 707
-
A recovery method of deleted record for SQLite databaseJeon, Sangjun / Bang, Jewan / Byun, Keunduck / Lee, Sangjin et al. | 2011
- 717
-
A cross-country comparison of the adoption of ubiquitous supply chain managementKim, Changsu / Johnson, Roger / Roussos, George / Lee, Simon J. et al. | 2011
- 729
-
Exploiting visual quasi-periodicity for real-time chewing event detection using active appearance models and support vector machinesCadavid, Steven / Abdel-Mottaleb, Mohamed / Helal, Abdelsalam et al. | 2011
- 741
-
An approach to domain-based scalable context management architecture in pervasive environmentsJaroucheh, Zakwan / Liu, Xiaodong / Smith, Sally et al. | 2011
- 757
-
You never call: Demoting unused contacts on mobile phones using DMTRBergman, Ofer / Komninos, Andreas / Liarokapis, Dimitrios / Clarke, James et al. | 2011
- 767
-
Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport securityKirman, Ben / Linehan, Conor / Lawson, Shaun et al. | 2011