Security in Pervasive Computing First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers / edited by Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann.

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Hutter, Dieter (Editor), Müller, Günter (Editor), Stephan, Werner (Editor), Ullmann, Markus (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Edition:1st ed. 2004.
Series:Lecture Notes in Computer Science, 2802
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Invited Talks (Abstracts)
  • The Age of Pervasive Computing – Everything Smart, Everything Connected?
  • Cyber Assist Project and Its Security Requirement
  • Security in Pervasive Computing
  • The Importance of High Assurance Security in Pervasive Computing
  • Location Privacy
  • A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
  • Protecting Access to People Location Information
  • Security Requirements
  • Smart Devices and Software Agents: The Basics of Good Behaviour
  • Dependability Issues of Pervasive Computing in a Healthcare Environment
  • Security Policies and Protection
  • Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
  • Enforcing Security Policies via Types
  • Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
  • Authentication and Trust
  • Authentication for Pervasive Computing
  • End-to-End Trust Starts with Recognition
  • Embedding Distance-Bounding Protocols within Intuitive Interactions
  • Secure Infrastructures
  • Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
  • Time Constraint Delegation for P2P Data Decryption
  • SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
  • Smart Labels
  • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
  • Verification
  • Implementing a Formally Verifiable Security Protocol in Java Card
  • Hardware Architectures
  • Cellular Automata Based Multiplier for Public-Key Cryptosystem
  • Enlisting Hardware Architecture to Thwart Malicious Code Injection
  • Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
  • Visual Crypto Displays Enabling Secure Communications
  • Workshop
  • Security and Privacy in Pervasive Computing State of the Art and Future Directions.