Coverart for item
The Resource Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)

Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)

Label
Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings
Title
Security in pervasive computing
Title remainder
second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings
Statement of responsibility
Dieter Hutter, Markus Ullmann (eds.)
Title variation
SPC 2005
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.5915
LC item number
.I58 2005
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
International Conference on Security in Pervasive Computing
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Hutter, Dieter
  • Ullmann, Markus
Series statement
Lecture notes in computer science,
Series volume
3450
http://library.link/vocab/subjectName
  • Ubiquitous computing
  • Computer security
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Informatique
  • Computer security
  • Ubiquitous computing
  • Datensicherung
  • Kryptosystem
  • Mensch-Maschine-Kommunikation
  • Mobile Computing
  • Privatsphäre
  • Sicherheitsprotokoll
  • Ubiquitous Computing
  • Contrôle d'accès
  • Informatique omniprésente
  • Mesures de sécurité
  • Sécurité informatique
  • Boppard (2005)
Label
Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)
Instantiates
Publication
Note
"2nd International Conference on Security in Pervasive Computing"--Preface
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices
Control code
262680865
Dimensions
unknown
Extent
1 online resource (xi, 238 pages)
Form of item
online
Isbn
9783540255215
Lccn
2005922931
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786611408268
  • 9783540255215
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-25521-5
Specific material designation
remote
System control number
(OCoLC)262680865
Label
Security in pervasive computing : second international conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings, Dieter Hutter, Markus Ullmann (eds.)
Publication
Note
"2nd International Conference on Security in Pervasive Computing"--Preface
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Invited Talk (Abstract) -- Pervasive Computing -- A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who's Talking -- Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices
Control code
262680865
Dimensions
unknown
Extent
1 online resource (xi, 238 pages)
Form of item
online
Isbn
9783540255215
Lccn
2005922931
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786611408268
  • 9783540255215
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-25521-5
Specific material designation
remote
System control number
(OCoLC)262680865

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...