


default search action
1. SPC 2003: Boppard, Germany
- Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann:

Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Lecture Notes in Computer Science 2802, Springer 2004, ISBN 3-540-20887-9
Invited Talks (Abstracts)
- Friedemann Mattern:

The Age of Pervasive Computing? Everything Smart, Everything Connected? 1 - Hideyuki Nakashima:

Cyber Assist Project and Its Security Requirement. 2-5 - Frank Stajano:

Security in Pervasive Computing. 6-8 - Paul A. Karger:

The Importance of High Assurance Security in Pervasive Computing. 9
Location Privacy
- Marco Gruteser, Dirk Grunwald:

A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. 10-24 - Urs Hengartner, Peter Steenkiste

:
Protecting Access to People Location Information. 25-38
Security Requirements
- Howard Chivers, John A. Clark, Susan Stepney:

Smart Devices and Software Agents: The Basics of Good Behaviour. 39-52 - Jürgen Bohn, Felix C. Gärtner, Harald Vogt:

Dependability Issues of Pervasive Computing in a Healthcare Environment. 53-70
Security Policies and Protection
- Håkan Kvarnström, Hans Hedbom, Erland Jonsson:

Protecting Security Policies in Ubiquitous Environments Using One-Way Functions. 71-85 - Daniele Gorla

, Rosario Pugliese:
Enforcing Security Policies via Types. 86-100 - Axel Schairer:

Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. 101-115
Authentication and Trust
- Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin:

Authentication for Pervasive Computing. 116-129 - Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen:

End-to-End Trust Starts with Recognition. 130-142 - Laurent Bussard, Yves Roudier:

Embedding Distance-Bounding Protocols within Intuitive Interactions. 143-156
Secure Infrastructures
- Philip Robinson, Michael Beigl:

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. 157-172 - Tieyan Li:

Time Constraint Delegation for P2P Data Decryption. 173-186 - Kemal Bicakci, Nazife Baykal:

SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. 187-200
Smart Labels
- Stephen A. Weis

, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels:
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. 201-212
Verification
- Engelbert Hubbers, Martijn Oostdijk, Erik Poll:

Implementing a Formally Verifiable Security Protocol in Java Card. 213-226
Hardware Architectures
- Hyun-Sung Kim, Kee-Young Yoo:

Cellular Automata Based Multiplier for Public-Key Cryptosystem. 227-236 - Ruby B. Lee, David K. Karig

, John Patrick McGregor, Zhijie Shi:
Enlisting Hardware Architecture to Thwart Malicious Code Injection. 237-252 - Johann Großschädl, Guy-Armand Kamendje:

Optimized RISC Architecture for Multiple-Precision Modular Arithmetic. 253-270 - Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen

, Toine Staring, Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications. 271-284
Workshop
- Dieter Hutter, Werner Stephan, Markus Ullmann:

Security and Privacy in Pervasive Computing State of the Art and Future Directions. 285-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














