Security in Pervasive Computing First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hutter, Dieter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Müller, Günter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Stephan, Werner (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Ullmann, Markus (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Έκδοση:1st ed. 2004.
Σειρά:Lecture Notes in Computer Science, 2802
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks (Abstracts)
  • The Age of Pervasive Computing - Everything Smart, Everything Connected?
  • Cyber Assist Project and Its Security Requirement
  • Security in Pervasive Computing
  • The Importance of High Assurance Security in Pervasive Computing
  • Location Privacy
  • A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
  • Protecting Access to People Location Information
  • Security Requirements
  • Smart Devices and Software Agents: The Basics of Good Behaviour
  • Dependability Issues of Pervasive Computing in a Healthcare Environment
  • Security Policies and Protection
  • Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
  • Enforcing Security Policies via Types
  • Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
  • Authentication and Trust
  • Authentication for Pervasive Computing
  • End-to-End Trust Starts with Recognition
  • Embedding Distance-Bounding Protocols within Intuitive Interactions
  • Secure Infrastructures
  • Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
  • Time Constraint Delegation for P2P Data Decryption
  • SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
  • Smart Labels
  • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
  • Verification
  • Implementing a Formally Verifiable Security Protocol in Java Card
  • Hardware Architectures
  • Cellular Automata Based Multiplier for Public-Key Cryptosystem
  • Enlisting Hardware Architecture to Thwart Malicious Code Injection
  • Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
  • Visual Crypto Displays Enabling Secure Communications
  • Workshop
  • Security and Privacy in Pervasive Computing State of the Art and Future Directions.