Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3450 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Talk (Abstract)
- Pervasive Computing - A Case for the Precautionary Principle?
- Session 1: Smart Devices and Applications
- TENeT: A Framework for Distributed Smartcards
- P2P Digital Value Fair Trading System Using Smart Cards
- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example
- Invited Talk (Abstract)
- Securing Ad Hoc Networks
- Session 2: Short Paper Session
- Secure Identity Management for Pseudo-Anonymous Service Access
- Security Issues for Pervasive Personalized Communication Systems
- Safeguards in a World of Ambient Intelligence
- Session 3: Authentication (I)
- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
- Invited Talk (Abstract)
- Security Concept of the EU-Passport
- Session 4: Authentication (II)
- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks
- Ephemeral Pairing on Anonymous Networks
- Invited Talk (Abstract)
- EPC Technology
- Session 5: Authentication (III)
- Exploiting Empirical Engagement in Authentication Protocol Design
- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
- Look Who's Talking - Authenticating Service Access Points
- Invited Talk (Abstract)
- Security Issues of Mobile Devices
- Session 6: Privacy and Anonymity
- Privacy for Profitable Location Based Services
- On the Anonymity of Periodic Location Samples
- Session 7: Access Control and Information Flow
- A Theorem Proving Approach to Analysis of Secure Information Flow
- An Efficient Access Control Model for Mobile Ad-Hoc Communities
- TrustAC: Trust-Based Access Control for Pervasive Devices.