TY - BOOK AU - Hutter,Dieter AU - Ullmann,Markus ED - International Conference on Security in Pervasive Computing TI - Security in pervasive computing: second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings T2 - Lecture notes in computer science, SN - 9783540320043 AV - QA76.5915 .I58 2005 U1 - 005.8 22 PY - 2005/// CY - Berlin, New York PB - Springer KW - Ubiquitous computing KW - Congresses KW - Computer security KW - Informatique omniprésente KW - Sécurité KW - Mesures KW - Congrès KW - Sécurité informatique KW - COMPUTERS KW - Internet KW - Security KW - bisacsh KW - Networking KW - General KW - Informatique KW - eclas KW - fast KW - Datensicherung KW - gnd KW - Kryptosystem KW - Mensch-Maschine-Kommunikation KW - Mobile Computing KW - Privatsphäre KW - Sicherheitsprotokoll KW - Ubiquitous Computing KW - Contrôle d'accès KW - rasuqam KW - Mesures de sécurité KW - Boppard (2005) KW - swd KW - computers KW - samenleving KW - society KW - informatiesystemen KW - information systems KW - computerwetenschappen KW - computer sciences KW - computernetwerken KW - computer networks KW - operating systems KW - software engineering KW - man-machine interaction KW - gebruikersinterfaces KW - user interfaces KW - Information and Communication Technology (General) KW - Informatie- en communicatietechnologie (algemeen) KW - Congress KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf KW - Kongress N1 - "2nd International Conference on Security in Pervasive Computing"--Preface; Includes bibliographical references and index; Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices; University staff and students only. Requires University Computer Account login off-campus UR - https://link.springer.com/10.1007/b135497 ER -