The Resource Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)
Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)
Resource Information
The item Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Language
- eng
- Extent
- 1 online resource (xi, 238 pages)
- Note
- "2nd International Conference on Security in Pervasive Computing"--Preface
- Contents
-
- Invited Talk (Abstract)
- Pervasive Computing
- A Case for the Precautionary Principle?
- Session 1: Smart Devices and Applications
- TENeT: A Framework for Distributed Smartcards
- P2P Digital Value Fair Trading System Using Smart Cards
- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example
- Invited Talk (Abstract)
- Securing Ad Hoc Networks
- Session 2: Short Paper Session
- Secure Identity Management for Pseudo-Anonymous Service Access
- Security Issues for Pervasive Personalized Communication Systems
- Safeguards in a World of Ambient Intelligence
- Session 3: Authentication (I)
- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
- Invited Talk (Abstract)
- Security Concept of the EU-Passport
- Session 4: Authentication (II)
- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks
- Ephemeral Pairing on Anonymous Networks
- Invited Talk (Abstract)
- EPC Technology
- Session 5: Authentication (III)
- Exploiting Empirical Engagement in Authentication Protocol Design
- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
- Look Who's Talking
- Authenticating Service Access Points
- Invited Talk (Abstract)
- Security Issues of Mobile Devices
- Session 6: Privacy and Anonymity
- Privacy for Profitable Location Based Services
- On the Anonymity of Periodic Location Samples
- Session 7: Access Control and Information Flow
- A Theorem Proving Approach to Analysis of Secure Information Flow
- An Efficient Access Control Model for Mobile Ad-Hoc Communities
- TrustAC: Trust-Based Access Control for Pervasive Devices
- Isbn
- 9783540255215
- Label
- Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings
- Title
- Security in pervasive computing
- Title remainder
- second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings
- Statement of responsibility
- Dieter Hutter, Markus Ullmann (eds.)
- Title variation
- SPC 2005
- Subject
-
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Datensicherung
- Informatique
- Informatique omniprésente
- Kongress
- Kryptosystem
- Mensch-Maschine-Kommunikation
- Mesures de sécurité
- Mobile Computing
- Privatsphäre
- Sicherheitsprotokoll
- Sécurité informatique
- Ubiquitous Computing
- Ubiquitous computing
- Ubiquitous computing
- Ubiquitous computing -- Congresses
- Boppard (2005)
- Language
- eng
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.5915
- LC item number
- .I58 2005
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- International Conference on Security in Pervasive Computing
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Hutter, Dieter
- Ullmann, Markus
- Series statement
- Lecture notes in computer science,
- Series volume
- 3450
- http://library.link/vocab/subjectName
-
- Ubiquitous computing
- Computer security
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Informatique
- Computer security
- Ubiquitous computing
- Datensicherung
- Kryptosystem
- Mensch-Maschine-Kommunikation
- Mobile Computing
- Privatsphäre
- Sicherheitsprotokoll
- Ubiquitous Computing
- Contrôle d'accès
- Informatique omniprésente
- Mesures de sécurité
- Sécurité informatique
- Boppard (2005)
- Label
- Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)
- Note
- "2nd International Conference on Security in Pervasive Computing"--Preface
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices
- Control code
- 262680865
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 238 pages)
- Form of item
- online
- Isbn
- 9783540255215
- Lccn
- 2005922931
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786611408268
- 9783540255215
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-25521-5
- Specific material designation
- remote
- System control number
- (OCoLC)262680865
- Label
- Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)
- Note
- "2nd International Conference on Security in Pervasive Computing"--Preface
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices
- Control code
- 262680865
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 238 pages)
- Form of item
- online
- Isbn
- 9783540255215
- Lccn
- 2005922931
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786611408268
- 9783540255215
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-25521-5
- Specific material designation
- remote
- System control number
- (OCoLC)262680865
Subject
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Datensicherung
- Informatique
- Informatique omniprésente
- Kongress
- Kryptosystem
- Mensch-Maschine-Kommunikation
- Mesures de sécurité
- Mobile Computing
- Privatsphäre
- Sicherheitsprotokoll
- Sécurité informatique
- Ubiquitous Computing
- Ubiquitous computing
- Ubiquitous computing
- Ubiquitous computing -- Congresses
- Boppard (2005)
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Security-in-pervasive-computing--second/cilIPLuZiqQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Security-in-pervasive-computing--second/cilIPLuZiqQ/">Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Security-in-pervasive-computing--second/cilIPLuZiqQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Security-in-pervasive-computing--second/cilIPLuZiqQ/">Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>