Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3450 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talk (Abstract)
- Pervasive Computing – A Case for the Precautionary Principle?
- Session 1: Smart Devices and Applications
- TENeT: A Framework for Distributed Smartcards
- P2P Digital Value Fair Trading System Using Smart Cards
- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example
- Invited Talk (Abstract)
- Securing Ad Hoc Networks
- Session 2: Short Paper Session
- Secure Identity Management for Pseudo-Anonymous Service Access
- Security Issues for Pervasive Personalized Communication Systems
- Safeguards in a World of Ambient Intelligence
- Session 3: Authentication (I)
- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
- Invited Talk (Abstract)
- Security Concept of the EU-Passport
- Session 4: Authentication (II)
- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks
- Ephemeral Pairing on Anonymous Networks
- Invited Talk (Abstract)
- EPC Technology
- Session 5: Authentication (III)
- Exploiting Empirical Engagement in Authentication Protocol Design
- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
- Look Who’s Talking – Authenticating Service Access Points
- Invited Talk (Abstract)
- Security Issues of Mobile Devices
- Session 6: Privacy and Anonymity
- Privacy for Profitable Location Based Services
- On the Anonymity of Periodic Location Samples
- Session 7: Access Control and Information Flow
- A Theorem Proving Approach to Analysis of Secure Information Flow
- An Efficient Access Control Model for Mobile Ad-Hoc Communities
- TrustAC: Trust-Based Access Control for Pervasive Devices.