Limit search to available items
Book Cover
E-book
Author International Conference on Security in Pervasive Computing (2nd : 2005 : Boppard, Germany)

Title Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings / Dieter Hutter, Markus Ullmann (eds.)
Published Berlin ; New York : Springer, ©2005

Copies

Description 1 online resource (xi, 238 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 3450
Lecture notes in computer science ; 3450. 0302-9743
Contents Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices
Analysis computers
samenleving
society
informatiesystemen
information systems
computerwetenschappen
computer sciences
computernetwerken
computer networks
operating systems
software engineering
man-machine interaction
gebruikersinterfaces
user interfaces
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes "2nd International Conference on Security in Pervasive Computing"--Preface
Bibliography Includes bibliographical references and index
Notes Print version record
In OhioLINK electronic book center
SpringerLink
Subject Ubiquitous computing -- Congresses
Computer security -- Congresses
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Informatique.
Computer security.
Ubiquitous computing.
Datensicherung
Kryptosystem
Mensch-Maschine-Kommunikation
Mobile Computing
Privatsphäre
Sicherheitsprotokoll
Ubiquitous Computing
Contrôle d'accès.
Informatique omniprésente.
Mesures de sécurité
Sécurité informatique.
Boppard (2005)
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Kongress.
Form Electronic book
Author Hutter, Dieter.
Ullmann, Markus.
ISBN 9783540320043
3540320040
3540255214
9783540255215
Other Titles SPC 2005