Technology, tools, applications, authentication and security IFIP World Conference on Mobile Communications 2 ¿ 6 September 1996, Canberra, Australia Herausgegeben:Encarnacao, J.L.; Rabaey, Jan M.
Technology, tools, applications, authentication and security IFIP World Conference on Mobile Communications 2 ¿ 6 September 1996, Canberra, Australia Herausgegeben:Encarnacao, J.L.; Rabaey, Jan M.
Mobile computing is one of the biggest issues of computer technology, science and industry today. This book looks at the requirements of developing mobile computing systems and the challenges they pose to computer designers. It examines the requirements of mobile computing hardware, infrastructure and communications services. Information security and the data protection aspects of design are considered, together with telecommunications facilities for linking up to the worldwide computer infrastructure. The book also considers the mobility of computer users versus the portability of the…mehr
Mobile computing is one of the biggest issues of computer technology, science and industry today. This book looks at the requirements of developing mobile computing systems and the challenges they pose to computer designers. It examines the requirements of mobile computing hardware, infrastructure and communications services. Information security and the data protection aspects of design are considered, together with telecommunications facilities for linking up to the worldwide computer infrastructure. The book also considers the mobility of computer users versus the portability of the equipment. The text also examines current applications of mobile computing in the public sector and future innovative applications.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
Produktdetails
IFIP Advances in Information and Communication Technology
Keynote Paper.- 1 Trends of flat displays in the multimedia age.- Track 1 Mobile Technology, Tools and Applications.- 2 System support and applications for mobile computing.- 3 Developments in mobile data system technology - particularly GSM.- 4 Replication-support for advanced mobile applications.- 5 Caching data over a broadcast channel.- 6 Mobile frames: a pragmatic approach to automatic application partitioning based on an end-user data model.- 7 Generic personal communications support for open service environments.- 8 Supporting user mobility.- 9 Designing secure agents with O.O. technologies for user's mobility.- 10 The idea: integrating authoring concepts for mobile agents into an authoring tool for active multimedia mail.- 11 Animation within mobile multimedia on-line services.- 12 Theoretical analyses of data communications integrated into cordless voice channels.- 13 Random access, reservation and polling multiaccess protocol for wireless data systems.- 14 Challenges in mobile information systems and services.- 15 A buffer overhead minimization method for multicast-based handoff in picocellular networks.- 16 Impact of mobility in mobile communication systems.- 17 Mobile computing based on GSM: the Mowgli approach.- 18 An adaptive data distribution system for mobile environments.- 19 Object oriented system architecture and strategies for the exchange of structured multimedia data with mobile hosts.- 20 Agent skills and their roles in mobile computing and personal communications.- 21 A global QoS management for wireless network.- 22 Resource discovery protocol for mobile computing.- Track 2 Trusting in Technology, Authentication, Security.- 23 The future of smart cards: technology and application.- 24 Use of smart cards for security applications by DeutscheTelekom.- 25 An authentication and security protocol for mobile computing.- 26 Design of secure end-to-end protocols for mobile systems.- 27 Yet another simple internet electronic payment system.- 28 Difficulties in achieving security in mobile communications.- 29 GSM digital cellular telephone system: a case study of encryption algorithms.- 30 A new algorithm for smart cards.- 31 A new approach to integrity of digital images.- 32 How to protect multimedia applications.- 33 Phone card application and authentication in wireless communications.- 34 Real-time mobile EFTPOS: challenges and implications of a world first application.- Index of Contributors.- Keyword Index.
Keynote Paper.- 1 Trends of flat displays in the multimedia age.- Track 1 Mobile Technology, Tools and Applications.- 2 System support and applications for mobile computing.- 3 Developments in mobile data system technology - particularly GSM.- 4 Replication-support for advanced mobile applications.- 5 Caching data over a broadcast channel.- 6 Mobile frames: a pragmatic approach to automatic application partitioning based on an end-user data model.- 7 Generic personal communications support for open service environments.- 8 Supporting user mobility.- 9 Designing secure agents with O.O. technologies for user's mobility.- 10 The idea: integrating authoring concepts for mobile agents into an authoring tool for active multimedia mail.- 11 Animation within mobile multimedia on-line services.- 12 Theoretical analyses of data communications integrated into cordless voice channels.- 13 Random access, reservation and polling multiaccess protocol for wireless data systems.- 14 Challenges in mobile information systems and services.- 15 A buffer overhead minimization method for multicast-based handoff in picocellular networks.- 16 Impact of mobility in mobile communication systems.- 17 Mobile computing based on GSM: the Mowgli approach.- 18 An adaptive data distribution system for mobile environments.- 19 Object oriented system architecture and strategies for the exchange of structured multimedia data with mobile hosts.- 20 Agent skills and their roles in mobile computing and personal communications.- 21 A global QoS management for wireless network.- 22 Resource discovery protocol for mobile computing.- Track 2 Trusting in Technology, Authentication, Security.- 23 The future of smart cards: technology and application.- 24 Use of smart cards for security applications by DeutscheTelekom.- 25 An authentication and security protocol for mobile computing.- 26 Design of secure end-to-end protocols for mobile systems.- 27 Yet another simple internet electronic payment system.- 28 Difficulties in achieving security in mobile communications.- 29 GSM digital cellular telephone system: a case study of encryption algorithms.- 30 A new algorithm for smart cards.- 31 A new approach to integrity of digital images.- 32 How to protect multimedia applications.- 33 Phone card application and authentication in wireless communications.- 34 Real-time mobile EFTPOS: challenges and implications of a world first application.- Index of Contributors.- Keyword Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826