Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings /
This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19-21, 2006 in York, UK. The conference focused on methods, tools, principles, and practices for assessing and achievingsecurityinapervasiveenvironment.Newsecurit...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
3934 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Talk
- Trust Without Identification
- Protocols
- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks
- Enabling Secure Discovery in a Pervasive Environment
- Forward Secure Communication in Wireless Sensor Networks
- Mechanisms
- Low Rate DoS Attack to Monoprocess Servers
- Delegating Secure Logging in Pervasive Computing Systems
- Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems
- Integrity
- Higher Dependability and Security for Mobile Applications
- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
- Privacy and Security
- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues
- Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security
- Privacy Sensitive Location Information Systems in Smart Buildings
- Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation
- Information Flow and Access Control
- Securing Information Gateways with Derivation-Constrained Access Control
- Information Flow Control to Secure Dynamic Web Service Composition
- Authentication
- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions
- Attribute-Based Authentication Model for Dynamic Mobile Environments.