Amazon cover image
Image from Amazon.com

Security in pervasive computing : First International Conference, Boppard, Germany, March 12-14, 2003 : revised papers / Dieter Hutter [and others].

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 2802.Publication details: Berlin ; New York : Springer, ©2004.Description: 1 online resource (xi, 289 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540398813
  • 3540398813
Subject(s): Genre/Form: Additional physical formats: Print version:International Conference on Security in Pervasive Computing (1st : 2003 : Boppard, Germany): Security in pervasive computing : First International Conference, Boppard, Germany, March 12-14, 2003 : revised papersDDC classification:
  • 005.8 22
LOC classification:
  • QA76.5915 .I58 2003
Other classification:
  • 54.62
  • 54.32
  • 83.42
  • SS 4800
  • DAT 460f
  • DAT 252f
Online resources:
Contents:
Invited Talks (Abstracts) -- The Age of Pervasive Computing -- Everything Smart, Everything Connected? -- Cyber Assist Project and Its Security Requirement -- Security in Pervasive Computing -- The Importance of High Assurance Security in Pervasive Computing -- Location Privacy -- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks -- Protecting Access to People Location Information -- Security Requirements -- Smart Devices and Software Agents: The Basics of Good Behaviour -- Dependability Issues of Pervasive Computing in a Healthcare Environment -- Security Policies and Protection -- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions -- Enforcing Security Policies via Types -- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems -- Authentication and Trust -- Authentication for Pervasive Computing -- End-to-End Trust Starts with Recognition -- Embedding Distance-Bounding Protocols within Intuitive Interactions -- Secure Infrastructures -- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments -- Time Constraint Delegation for P2P Data Decryption -- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing -- Smart Labels -- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems -- Verification -- Implementing a Formally Verifiable Security Protocol in Java Card -- Hardware Architectures -- Cellular Automata Based Multiplier for Public-Key Cryptosystem -- Enlisting Hardware Architecture to Thwart Malicious Code Injection -- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic -- Visual Crypto Displays Enabling Secure Communications -- Workshop -- Security and Privacy in Pervasive Computing State of the Art and Future Directions.
Summary: This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003. The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefully selected during two rounds of reviewing and improvements. The papers are organized in topical sections on location privacy, security requirements, security policies and protection, authentication and trust, secure infrastructures, smart labels, verifications, and hardware architectures.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003. The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefully selected during two rounds of reviewing and improvements. The papers are organized in topical sections on location privacy, security requirements, security policies and protection, authentication and trust, secure infrastructures, smart labels, verifications, and hardware architectures.

Invited Talks (Abstracts) -- The Age of Pervasive Computing -- Everything Smart, Everything Connected? -- Cyber Assist Project and Its Security Requirement -- Security in Pervasive Computing -- The Importance of High Assurance Security in Pervasive Computing -- Location Privacy -- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks -- Protecting Access to People Location Information -- Security Requirements -- Smart Devices and Software Agents: The Basics of Good Behaviour -- Dependability Issues of Pervasive Computing in a Healthcare Environment -- Security Policies and Protection -- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions -- Enforcing Security Policies via Types -- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems -- Authentication and Trust -- Authentication for Pervasive Computing -- End-to-End Trust Starts with Recognition -- Embedding Distance-Bounding Protocols within Intuitive Interactions -- Secure Infrastructures -- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments -- Time Constraint Delegation for P2P Data Decryption -- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing -- Smart Labels -- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems -- Verification -- Implementing a Formally Verifiable Security Protocol in Java Card -- Hardware Architectures -- Cellular Automata Based Multiplier for Public-Key Cryptosystem -- Enlisting Hardware Architecture to Thwart Malicious Code Injection -- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic -- Visual Crypto Displays Enabling Secure Communications -- Workshop -- Security and Privacy in Pervasive Computing State of the Art and Future Directions.

Powered by Koha