Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings / Dieter Hutter, Markus Ullmann (eds.).

By: (2nd : International Conference on Security in Pervasive Computing (2nd : 2005 : Boppard, Germany)
Contributor(s): Hutter, Dieter | Ullmann, Markus
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 3450.Publisher: Berlin ; New York : Springer, ©2005Description: 1 online resource (xi, 238 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540320043; 3540320040; 3540255214; 9783540255215Other title: SPC 2005Subject(s): Ubiquitous computing -- Congresses | Computer security -- Congresses | Informatique omniprésente -- Sécurité -- Mesures -- Congrès | Systèmes informatiques -- Sécurité -- Mesures -- Congrès | Sécurité informatique -- Congrès | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Informatique | Computer security | Ubiquitous computing | Datensicherung | Kryptosystem | Mensch-Maschine-Kommunikation | Mobile Computing | Privatsphäre | Sicherheitsprotokoll | Ubiquitous Computing | Contrôle d'accès | Informatique omniprésente | Mesures de sécurité | Sécurité informatique | Boppard (2005) | computers | samenleving | society | informatiesystemen | information systems | computerwetenschappen | computer sciences | computernetwerken | computer networks | operating systems | software engineering | man-machine interaction | gebruikersinterfaces | user interfaces | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. | Kongress. Additional physical formats: Print version:: Security in pervasive computing.DDC classification: 005.8 LOC classification: QA76.5915 | .I58 2005Other classification: SS 4800 | 004 | DAT 610f | DAT 465f Online resources: Click here to access online
Contents:
Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

"2nd International Conference on Security in Pervasive Computing"--Preface.

Includes bibliographical references and index.

Print version record.

Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices.

There are no comments for this item.

to post a comment.

Powered by Koha