+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Security for Mobility. Telecommunications - Product Image

Security for Mobility. Telecommunications

  • ID: 3527801
  • Book
  • IET Books
1 of 3

Over the last two decades, mobile telecommunications has grown dramatically, from a small niche technology to a massive industry. Mobile telephones are now ubiquitous, and the divisions between PCs, PDAs, mobile telephones and other mobile devices are becoming increasingly blurred. Against this background, the security of information of both the devices themselves, and the information handled by these devices, is becoming ever more important.

Security for Mobility pulls together up to the minute research from an international group of academics and professionals working in industry. The main text of the book is divided into five parts - underlying technologies; network security; mobile code issues; application security; and the future. Each chapter of the book is the collaboration of different authors, including many of the leading European experts currently working within the field. Thus each chapter is self-contained and can be read independently, although there are many relationships between the various chapters.

The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.

Note: Product cover images may vary from those shown
2 of 3
- Part I: Underlying technologies
- Chapter 1: Cryptography for mobile security
- Chapter 2: PKI in mobile systems
- Chapter 3: The personal PKI
- Chapter 4: The smartcard as a mobile security device
- Chapter 5: Secure mobile tokens - the future
- Part II: Network security
- Chapter 6: UMTS security
- Chapter 7: Securing network access in future mobile systems
- Chapter 8: Public key based network access
- Chapter 9: Security in personal area networks
- Chapter 10: Towards the security of routing in ad hoc networks
- Chapter 11: Security issues in a MobileIPv6 network
- Part III: Mobile code issues
- Chapter 12: Security for agent systems and mobile agents
- Chapter 13: Security issues for downloaded code in mobile phones
- Part IV: Application security
- Chapter 14: Secure mobile commerce
- Chapter 15: Securing the delivery of digital content over the Internet
- Chapter 16: Security for future standardised DRM
- Part V: The future
- Chapter 17: Pioneering advanced mobile privacy and security
Note: Product cover images may vary from those shown
3 of 3


4 of 3
Chris J. Mitchell

Chris J. Mitchell has worked on cryptography and its applications for nearly 25 years, after completing a PhD in mathematics at the University of London. From 1979 to 1990 he worked within industrial R&D and research environments, for Racal Electronics and then Hewlett-Packard, specialising in cryptographic and security systems. He has been a Professor of Computer Science at Royal Holloway, University of London since 1990, specialising in Information Security. He has published over 150 papers, and edited four books and six international standards.

Note: Product cover images may vary from those shown