Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hutter, Dieter (Επιμελητής έκδοσης), Ullmann, Markus (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3450
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talk (Abstract)
  • Pervasive Computing – A Case for the Precautionary Principle?
  • Session 1: Smart Devices and Applications
  • TENeT: A Framework for Distributed Smartcards
  • P2P Digital Value Fair Trading System Using Smart Cards
  • “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example
  • Invited Talk (Abstract)
  • Securing Ad Hoc Networks
  • Session 2: Short Paper Session
  • Secure Identity Management for Pseudo-Anonymous Service Access
  • Security Issues for Pervasive Personalized Communication Systems
  • Safeguards in a World of Ambient Intelligence
  • Session 3: Authentication (I)
  • Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
  • Invited Talk (Abstract)
  • Security Concept of the EU-Passport
  • Session 4: Authentication (II)
  • Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks
  • Ephemeral Pairing on Anonymous Networks
  • Invited Talk (Abstract)
  • EPC Technology
  • Session 5: Authentication (III)
  • Exploiting Empirical Engagement in Authentication Protocol Design
  • Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
  • Look Who’s Talking – Authenticating Service Access Points
  • Invited Talk (Abstract)
  • Security Issues of Mobile Devices
  • Session 6: Privacy and Anonymity
  • Privacy for Profitable Location Based Services
  • On the Anonymity of Periodic Location Samples
  • Session 7: Access Control and Information Flow
  • A Theorem Proving Approach to Analysis of Secure Information Flow
  • An Efficient Access Control Model for Mobile Ad-Hoc Communities
  • TrustAC: Trust-Based Access Control for Pervasive Devices.