Security in Pervasive Computing First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2004.
|
Έκδοση: | 1st ed. 2004. |
Σειρά: | Lecture Notes in Computer Science,
2802 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talks (Abstracts)
- The Age of Pervasive Computing - Everything Smart, Everything Connected?
- Cyber Assist Project and Its Security Requirement
- Security in Pervasive Computing
- The Importance of High Assurance Security in Pervasive Computing
- Location Privacy
- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
- Protecting Access to People Location Information
- Security Requirements
- Smart Devices and Software Agents: The Basics of Good Behaviour
- Dependability Issues of Pervasive Computing in a Healthcare Environment
- Security Policies and Protection
- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
- Enforcing Security Policies via Types
- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
- Authentication and Trust
- Authentication for Pervasive Computing
- End-to-End Trust Starts with Recognition
- Embedding Distance-Bounding Protocols within Intuitive Interactions
- Secure Infrastructures
- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
- Time Constraint Delegation for P2P Data Decryption
- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
- Smart Labels
- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
- Verification
- Implementing a Formally Verifiable Security Protocol in Java Card
- Hardware Architectures
- Cellular Automata Based Multiplier for Public-Key Cryptosystem
- Enlisting Hardware Architecture to Thwart Malicious Code Injection
- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
- Visual Crypto Displays Enabling Secure Communications
- Workshop
- Security and Privacy in Pervasive Computing State of the Art and Future Directions.