14. IFIP Congress 1996:
Canberra,
Australia
José L. Encarnação, Jan M. Rabaey (Eds.):
Mobile Communications: Technology, Tools Applications, Authentication and Security.
IFIP Conference Proceedings 66 Chapman & Hall 1996, ISBN 0-412-75580-7 BibTeX
@proceedings{DBLP:conf/ifip/1996-2,
editor = {Jos{\'e} L. Encarna\c{c}{\~a}o and
Jan M. Rabaey},
title = {Mobile Communications: Technology, Tools Applications, Authentication
and Security},
booktitle = {IFIP World Conference on Mobile Communications},
publisher = {Chapman {\&} Hall},
series = {IFIP Conference Proceedings},
volume = {66},
year = {1996},
isbn = {0-412-75580-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Keynote Paper
TRACK 1:
MOBILE TECHNOLOGY,
TOOLS AND APPLICATIONS
PART ONE:
System Support for Mobile Communications
Invited Paper
- N. Diehl:
System Support and Applications for Mobile Computing.
9-10 BibTeX
- J. Leske:
Developments in Mobile Data System Technology - particularly GSM.
11-20 BibTeX
PART TWO:
Caching and Replication for Mobile Communications
PART THREE:
Basic Architectures for Mobile Information Systems
PART FOUR:
Mobile Agents and Multimedia Applications
Invited Paper
PART FIVE:
Networking and Protocols for Mobile Communication
- R. Canchi, Yoshihiko Akaiwa:
Theoretical Analyses of Data Communications Integrated into Cordless Vioce Channels.
111-118 BibTeX
- T. Buot:
Random Access, Reservation and Polling Multiaccess Protocol for Wireless Data Systems.
119-126 BibTeX
PART SIX:
Methods and Algorithms for Mobile Information Access
Invited Paper
PART SEVEN:
Mobile Communication Architectures
PART EIGHT:
QoS-Management and Resource Discovery for Mobile Communication
Invited Paper
TRACK 2:
Trusting in Technology,
Authentication,
Security
Invited Paper
Industrial State-of-the-Art Report
PART ONE:
Protocols for Authentication,
Secure Communication and Payment
PART TWO:
Genral Security Aspects in Mobile Communication
- I. Nurkic:
Difficulties in Achieving Security in Mobile Comminocations.
277-284 BibTeX
- Tony Smith:
GSM Digital Cellular Telephone System: A Case Study of Encryption Algorithms.
285-298 BibTeX
PART THREE:
New Security Algorithms and Methods
Invited Paper
PART FOUR:
Secure Mobile Applications
Copyright © Sat May 16 23:22:34 2009
by Michael Ley (ley@uni-trier.de)