> Detailanzeige
Hutter, Dieter
[Sonstige Person, Familie und Körperschaft];
Ullmann, Markus
[Sonstige Person, Familie und Körperschaft]
Security in Pervasive Computing (vol. # 3450)
Teilen
Literatur-
verwaltung
Direktlink
Zur
Merkliste
Lösche von
Merkliste
Per Email teilen
Auf Twitter teilen
Auf Facebook teilen
Per Whatsapp teilen
- Medientyp: E-Book; Konferenzbericht
- Titel: Security in Pervasive Computing (vol. # 3450) : Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
- Beteiligte: Hutter, Dieter [Sonstige Person, Familie und Körperschaft]; Ullmann, Markus [Sonstige Person, Familie und Körperschaft]
-
Erschienen:
Berlin, Heidelberg: Springer Berlin Heidelberg, 2005
-
Erschienen in:
Lecture notes in computer science ; 3450
Bücher - Umfang: Online-Ressource (XI, 239 p. Also available online, digital)
- Sprache: Englisch
- DOI: 10.1007/b135497
- ISBN: 9783540320043
- Identifikator:
-
RVK-Notation:
SS 4800 : Lecture notes in computer science
-
Schlagwörter:
Mensch-Maschine-Kommunikation
>
Mobile Computing
>
Ubiquitous Computing
>
Datensicherung
Mobile Computing > Ubiquitous Computing > Privatsphäre > Datensicherung
Mobile Computing > Ubiquitous Computing > Kryptosystem > Sicherheitsprotokoll
- Entstehung:
- Anmerkungen:
- Beschreibung: Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who’s Talking – Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices.