|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Chris J. MitchellPublisher: Institution of Engineering and Technology Imprint: Institution of Engineering and Technology Edition: illustrated edition Dimensions: Width: 15.60cm , Height: 3.20cm , Length: 23.40cm Weight: 0.816kg ISBN: 9780863413377ISBN 10: 0863413374 Pages: 466 Publication Date: 05 December 2003 Audience: College/higher education , Professional and scholarly , College/higher education , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPart I: Underlying technologiesChapter 1: Cryptography for mobile securityChapter 2: PKI in mobile systemsChapter 3: The personal PKIChapter 4: The smartcard as a mobile security deviceChapter 5: Secure mobile tokens - the futurePart II: Network securityChapter 6: UMTS securityChapter 7: Securing network access in future mobile systemsChapter 8: Public key based network accessChapter 9: Security in personal area networksChapter 10: Towards the security of routing in ad hoc networksChapter 11: Security issues in a MobileIPv6 networkPart III: Mobile code issuesChapter 12: Security for agent systems and mobile agentsChapter 13: Security issues for downloaded code in mobile phonesPart IV: Application securityChapter 14: Secure mobile commerceChapter 15: Securing the delivery of digital content over the InternetChapter 16: Security for future standardised DRMPart V: The futureChapter 17: Pioneering advanced mobile privacy and securityReviewsAuthor InformationChris J. Mitchell has worked on cryptography and its applications for nearly 25 years, after completing a PhD in mathematics at the University of London. From 1979 to 1990 he worked within industrial R&D and research environments, for Racal Electronics and then Hewlett-Packard, specialising in cryptographic and security systems. He has been a Professor of Computer Science at Royal Holloway, University of London since 1990, specialising in Information Security. He has published over 150 papers, and edited four books and six international standards. Tab Content 6Author Website:Countries AvailableAll regions |