Security in Pervasive Computing [electronic resource] : First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers / edited by Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann.
Material type:
TextSeries: Lecture Notes in Computer Science ; 2802Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004Description: XII, 296 p. online resourceContent type: - text
- computer
- online resource
- 9783540398813
- Computer science
- Computer Communication Networks
- Software engineering
- Operating systems (Computers)
- Data encryption (Computer science)
- Information systems
- Computer Science
- Computer Communication Networks
- Software Engineering
- Operating Systems
- Data Encryption
- Information Systems Applications (incl.Internet)
- Computers and Society
- 004.6 23
- TK5105.5-5105.9
E-BOOKS
| Home library | Call number | Materials specified | URL | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
| IMSc Library | Link to resource | Available | EBK4749 |
Invited Talks (Abstracts) -- The Age of Pervasive Computing – Everything Smart, Everything Connected? -- Cyber Assist Project and Its Security Requirement -- Security in Pervasive Computing -- The Importance of High Assurance Security in Pervasive Computing -- Location Privacy -- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks -- Protecting Access to People Location Information -- Security Requirements -- Smart Devices and Software Agents: The Basics of Good Behaviour -- Dependability Issues of Pervasive Computing in a Healthcare Environment -- Security Policies and Protection -- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions -- Enforcing Security Policies via Types -- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems -- Authentication and Trust -- Authentication for Pervasive Computing -- End-to-End Trust Starts with Recognition -- Embedding Distance-Bounding Protocols within Intuitive Interactions -- Secure Infrastructures -- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments -- Time Constraint Delegation for P2P Data Decryption -- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing -- Smart Labels -- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems -- Verification -- Implementing a Formally Verifiable Security Protocol in Java Card -- Hardware Architectures -- Cellular Automata Based Multiplier for Public-Key Cryptosystem -- Enlisting Hardware Architecture to Thwart Malicious Code Injection -- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic -- Visual Crypto Displays Enabling Secure Communications -- Workshop -- Security and Privacy in Pervasive Computing State of the Art and Future Directions.
There are no comments on this title.