Security in Pervasive Computing First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers /
Corporate Author: | |
---|---|
Other Authors: | , , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2004.
|
Edition: | 1st ed. 2004. |
Series: | Lecture Notes in Computer Science,
2802 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Invited Talks (Abstracts)
- The Age of Pervasive Computing - Everything Smart, Everything Connected?
- Cyber Assist Project and Its Security Requirement
- Security in Pervasive Computing
- The Importance of High Assurance Security in Pervasive Computing
- Location Privacy
- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
- Protecting Access to People Location Information
- Security Requirements
- Smart Devices and Software Agents: The Basics of Good Behaviour
- Dependability Issues of Pervasive Computing in a Healthcare Environment
- Security Policies and Protection
- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
- Enforcing Security Policies via Types
- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
- Authentication and Trust
- Authentication for Pervasive Computing
- End-to-End Trust Starts with Recognition
- Embedding Distance-Bounding Protocols within Intuitive Interactions
- Secure Infrastructures
- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
- Time Constraint Delegation for P2P Data Decryption
- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
- Smart Labels
- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
- Verification
- Implementing a Formally Verifiable Security Protocol in Java Card
- Hardware Architectures
- Cellular Automata Based Multiplier for Public-Key Cryptosystem
- Enlisting Hardware Architecture to Thwart Malicious Code Injection
- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
- Visual Crypto Displays Enabling Secure Communications
- Workshop
- Security and Privacy in Pervasive Computing State of the Art and Future Directions.