Security in Pervasive Computing [electronic resource] : First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers /
Material type: TextSeries: Lecture Notes in Computer Science ; 2802Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004Edition: 1st ed. 2004Description: XII, 296 p. online resourceContent type:- text
- computer
- online resource
- 9783540398813
- Cryptography
- Data encryption (Computer science)
- Computer networks
- Software engineering
- Operating systems (Computers)
- Application software
- Computers and civilization
- Cryptology
- Computer Communication Networks
- Software Engineering
- Operating Systems
- Computer and Information Systems Applications
- Computers and Society
- 005.824 23
- QA268
Invited Talks (Abstracts) -- The Age of Pervasive Computing – Everything Smart, Everything Connected? -- Cyber Assist Project and Its Security Requirement -- Security in Pervasive Computing -- The Importance of High Assurance Security in Pervasive Computing -- Location Privacy -- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks -- Protecting Access to People Location Information -- Security Requirements -- Smart Devices and Software Agents: The Basics of Good Behaviour -- Dependability Issues of Pervasive Computing in a Healthcare Environment -- Security Policies and Protection -- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions -- Enforcing Security Policies via Types -- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems -- Authentication and Trust -- Authentication for Pervasive Computing -- End-to-End Trust Starts with Recognition -- Embedding Distance-Bounding Protocols within Intuitive Interactions -- Secure Infrastructures -- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments -- Time Constraint Delegation for P2P Data Decryption -- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing -- Smart Labels -- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems -- Verification -- Implementing a Formally Verifiable Security Protocol in Java Card -- Hardware Architectures -- Cellular Automata Based Multiplier for Public-Key Cryptosystem -- Enlisting Hardware Architecture to Thwart Malicious Code Injection -- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic -- Visual Crypto Displays Enabling Secure Communications -- Workshop -- Security and Privacy in Pervasive Computing State of the Artand Future Directions.
There are no comments on this title.