


Остановите войну!
for scientists:


default search action
1. SPC 2003: Boppard, Germany
- Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann:
Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Lecture Notes in Computer Science 2802, Springer 2004, ISBN 3-540-20887-9
Invited Talks (Abstracts)
- Friedemann Mattern:
The Age of Pervasive Computing? Everything Smart, Everything Connected? 1 - Hideyuki Nakashima:
Cyber Assist Project and Its Security Requirement. 2-5 - Frank Stajano:
Security in Pervasive Computing. 6-8 - Paul A. Karger:
The Importance of High Assurance Security in Pervasive Computing. 9
Location Privacy
- Marco Gruteser, Dirk Grunwald:
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. 10-24 - Urs Hengartner, Peter Steenkiste:
Protecting Access to People Location Information. 25-38
Security Requirements
- Howard Chivers, John A. Clark, Susan Stepney:
Smart Devices and Software Agents: The Basics of Good Behaviour. 39-52 - Jürgen Bohn, Felix C. Gärtner, Harald Vogt:
Dependability Issues of Pervasive Computing in a Healthcare Environment. 53-70
Security Policies and Protection
- Håkan Kvarnström, Hans Hedbom, Erland Jonsson:
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions. 71-85 - Daniele Gorla
, Rosario Pugliese:
Enforcing Security Policies via Types. 86-100 - Axel Schairer:
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. 101-115
Authentication and Trust
- Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin:
Authentication for Pervasive Computing. 116-129 - Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen:
End-to-End Trust Starts with Recognition. 130-142 - Laurent Bussard, Yves Roudier:
Embedding Distance-Bounding Protocols within Intuitive Interactions. 143-156
Secure Infrastructures
- Philip Robinson, Michael Beigl:
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. 157-172 - Tieyan Li:
Time Constraint Delegation for P2P Data Decryption. 173-186 - Kemal Bicakci, Nazife Baykal:
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. 187-200
Smart Labels
- Stephen A. Weis
, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels:
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. 201-212
Verification
- Engelbert Hubbers, Martijn Oostdijk, Erik Poll:
Implementing a Formally Verifiable Security Protocol in Java Card. 213-226
Hardware Architectures
- Hyun-Sung Kim, Kee-Young Yoo:
Cellular Automata Based Multiplier for Public-Key Cryptosystem. 227-236 - Ruby B. Lee, David K. Karig
, John Patrick McGregor, Zhijie Shi:
Enlisting Hardware Architecture to Thwart Malicious Code Injection. 237-252 - Johann Großschädl, Guy-Armand Kamendje:
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic. 253-270 - Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications. 271-284
Workshop
- Dieter Hutter, Werner Stephan, Markus Ullmann:
Security and Privacy in Pervasive Computing State of the Art and Future Directions. 285-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.