Security in Pervasive Computing First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers /

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Hutter, Dieter (Editor, http://id.loc.gov/vocabulary/relators/edt), Müller, Günter (Editor, http://id.loc.gov/vocabulary/relators/edt), Stephan, Werner (Editor, http://id.loc.gov/vocabulary/relators/edt), Ullmann, Markus (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Edition:1st ed. 2004.
Series:Lecture Notes in Computer Science, 2802
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Invited Talks (Abstracts)
  • The Age of Pervasive Computing - Everything Smart, Everything Connected?
  • Cyber Assist Project and Its Security Requirement
  • Security in Pervasive Computing
  • The Importance of High Assurance Security in Pervasive Computing
  • Location Privacy
  • A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
  • Protecting Access to People Location Information
  • Security Requirements
  • Smart Devices and Software Agents: The Basics of Good Behaviour
  • Dependability Issues of Pervasive Computing in a Healthcare Environment
  • Security Policies and Protection
  • Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
  • Enforcing Security Policies via Types
  • Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
  • Authentication and Trust
  • Authentication for Pervasive Computing
  • End-to-End Trust Starts with Recognition
  • Embedding Distance-Bounding Protocols within Intuitive Interactions
  • Secure Infrastructures
  • Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
  • Time Constraint Delegation for P2P Data Decryption
  • SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
  • Smart Labels
  • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
  • Verification
  • Implementing a Formally Verifiable Security Protocol in Java Card
  • Hardware Architectures
  • Cellular Automata Based Multiplier for Public-Key Cryptosystem
  • Enlisting Hardware Architecture to Thwart Malicious Code Injection
  • Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
  • Visual Crypto Displays Enabling Secure Communications
  • Workshop
  • Security and Privacy in Pervasive Computing State of the Art and Future Directions.