Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings / Dieter Hutter, Markus Ullmann (eds.).
Material type:
TextPublisher number: 11414360Series: Lecture notes in computer science ; 3450.Publication details: Berlin ; New York : Springer, ©2005.Description: 1 online resource (xi, 238 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783540320043
- 3540320040
- 3540255214
- 9783540255215
- SPC 2005
- Ubiquitous computing -- Congresses
- Computer security -- Congresses
- Informatique omniprésente -- Sécurité -- Mesures -- Congrès
- Sécurité informatique -- Congrès
- Informatique omniprésente -- Congrès
- COMPUTERS -- Internet -- Security
- COMPUTERS -- Networking -- Security
- COMPUTERS -- Security -- General
- Informatique
- Computer security
- Ubiquitous computing
- Datensicherung
- Kryptosystem
- Mensch-Maschine-Kommunikation
- Mobile Computing
- Privatsphäre
- Sicherheitsprotokoll
- Ubiquitous Computing
- Contrôle d'accès
- Informatique omniprésente
- Mesures de sécurité
- Sécurité informatique
- Boppard (2005)
- computers
- samenleving
- society
- informatiesystemen
- information systems
- computerwetenschappen
- computer sciences
- computernetwerken
- computer networks
- operating systems
- software engineering
- man-machine interaction
- gebruikersinterfaces
- user interfaces
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 22
- QA76.5915 .I58 2005
- SS 4800
- 004
- DAT 610f
- DAT 465f
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
"2nd International Conference on Security in Pervasive Computing"--Preface
Includes bibliographical references and index.
Print version record.
Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices.
University staff and students only. Requires University Computer Account login off-campus.