


default search action
2. SPC 2005: Boppard, Germany
- Dieter Hutter, Markus Ullmann:

Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings. Lecture Notes in Computer Science 3450, Springer 2005, ISBN 3-540-25521-4
Invited Talk (Abstract)
- Lorenz M. Hilty

:
Pervasive Computing - A Case for the Precautionary Principle? 1-2
Smart Devices and Applications
- Masayuki Terada

, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura:
TENeT: A Framework for Distributed Smartcards. 3-17 - Masayuki Hanadate, Masayuki Terada, Shinji Nagao, Toshiyuki Miyazawa, Yukiko Yosuke, Seiji Tomita, Ko Fujimura:

P2P Digital Value Fair Trading System Using Smart Cards. 18-30 - Yang Liu, John A. Clark, Susan Stepney:

"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. 31-45
Invited Talk (Abstract)
- Panagiotis Papadimitratos

:
Securing Ad Hoc Networks. 46-47
Short Paper Session
- Michael Hitchens

, Judy Kay, Bob Kummerfeld, Ajay Brar:
Secure Identity Management for Pseudo-Anonymous Service Access. 48-55 - Bertin Klein, Tristan Miller, Sandra Zilles:

Security Issues for Pervasive Personalized Communication Systems. 56-62 - Michael Friedewald:

Safeguards in a World of Ambient Intelligence. 63-69
Authentication (I)
- Keunwoo Rhee, Jin Kwak, Seungjoo Kim

, Dongho Won:
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. 70-84
Invited Talk (Abstract)
- Dennis Kügler:

Security Concept of the EU-Passport. 85
Authentication (II)
- Stefaan Seys, Bart Preneel:

Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. 86-100 - Jaap-Henk Hoepman:

Ephemeral Pairing on Anonymous Networks. 101-116
Invited Talk (Abstract)
- Christian Floerkemeier, Frédéric Thiesse:

EPC Technology. 117-118
Authentication (III)
- Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin:

Exploiting Empirical Engagement in Authentication Protocol Design. 119-133 - Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell:

Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. 134-150 - Adolf Hohl, Lutz Lowis, Alf Zugenmaier:

Look Who's Talking - Authenticating Service Access Points. 151-162
Invited Talk (Abstract)
- Claudia Eckert:

Security Issues of Mobile Devices. 163
Privacy and Anonymity
- Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss

, Dogan Kesdogan:
Privacy for Profitable Location Based Services. 164-178 - Marco Gruteser, Baik Hoh:

On the Anonymity of Periodic Location Samples. 179-192
Access Control and Information Flow
- Ádám Darvas, Reiner Hähnle, David Sands:

A Theorem Proving Approach to Analysis of Secure Information Flow. 193-209 - Sye Loong Keoh

, Emil Lupu:
An Efficient Access Control Model for Mobile Ad-Hoc Communities. 210-224 - Florina Almenárez

, Andrés Marín López, Celeste Campo, R. Carlos García:
TrustAC: Trust-Based Access Control for Pervasive Devices. 225-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














