Export citation

Show simple item record

dc.contributor.authorGeorgios Kambourakis (Ed.)*
dc.contributor.authorGuojun Wang (Ed.)*
dc.contributor.authorFélix Gómez Mármol (Ed.)*
dc.date.accessioned2021-02-12T03:11:13Z
dc.date.available2021-02-12T03:11:13Z
dc.date.issued2018*
dc.date.submitted2018-04-13 14:25:58*
dc.identifier26491*
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/59094
dc.description.abstractCurrently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payments, application purchases, as well as social interaction; (b) such devices uniquely identify their users and store sensitive and detailed information about them; and (c) despite all their sophistication, native security mechanisms of mobile operating systems can be bypassed, and several wireless interfaces and protocols have been proven to be vulnerable to attack. As the attacker is given so many alternative entry points for penetration, the creation of assaults against the end-user and the underlying systems and services have been augmented, both in amount, as well as in matters of complexity. It is, therefore, imperative that new and advanced security and privacy-preserving measures are deployed. To cope with the aforementioned challenges, this edited book has been dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. This edited book presents a collection of nine chapters. All the chapters constitute original research work addressing a variety of topics pertaining to the above-mentioned challenges.*
dc.languageEnglish*
dc.subjectTK7885-7895*
dc.subject.otherintrusion*
dc.subject.otherdefense*
dc.subject.otherattack*
dc.subject.othermobile*
dc.subject.otherprivacy*
dc.subject.otherwireless*
dc.subject.otheranonymity*
dc.subject.otherthreat*
dc.subject.othervulnerability*
dc.subject.otherSecurity*
dc.subject.otherIoT*
dc.titleSecurity and Privacy in Wireless and Mobile Networks*
dc.typebook
oapen.relation.isPublishedBy46cabcaa-dd94-4bfe-87b4-55023c1b36d0*
oapen.relation.isbn9783038427797*
oapen.relation.isbn9783038427803*
oapen.pagesVIII, 164*
oapen.edition1st*


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by-nc-nd/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-nd/4.0/