Cargando…

Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings /

This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19-21, 2006 in York, UK. The conference focused on methods, tools, principles, and practices for assessing and achievingsecurityinapervasiveenvironment.Newsecurit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Clark, John A. (Editor ), Paige, Richard F. (Editor ), Polack, Fiona A.C (Editor ), Brooke, Phillip J. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 3934
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talk
  • Trust Without Identification
  • Protocols
  • Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks
  • Enabling Secure Discovery in a Pervasive Environment
  • Forward Secure Communication in Wireless Sensor Networks
  • Mechanisms
  • Low Rate DoS Attack to Monoprocess Servers
  • Delegating Secure Logging in Pervasive Computing Systems
  • Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems
  • Integrity
  • Higher Dependability and Security for Mobile Applications
  • Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
  • Privacy and Security
  • The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues
  • Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security
  • Privacy Sensitive Location Information Systems in Smart Buildings
  • Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation
  • Information Flow and Access Control
  • Securing Information Gateways with Derivation-Constrained Access Control
  • Information Flow Control to Secure Dynamic Web Service Composition
  • Authentication
  • Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions
  • Attribute-Based Authentication Model for Dynamic Mobile Environments.