


default search action
3. SPC 2006: York, UK
- John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke:

Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings. Lecture Notes in Computer Science 3934, Springer 2006, ISBN 3-540-33376-2
Invited Talk
- Howard Chivers:

Trust Without Identification. 1-2
Protocols
- Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong

:
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. 3-17 - Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier:

Enabling Secure Discovery in a Pervasive Environment. 18-31 - Sjouke Mauw

, Ivo van Vessem, Bert Bos:
Forward Secure Communication in Wireless Sensor Networks. 32-42
Mechanisms
- Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:

Low Rate DoS Attack to Monoprocess Servers. 43-57 - Rafael Accorsi, Adolf Hohl:

Delegating Secure Logging in Pervasive Computing Systems. 58-72 - Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen:

Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. 73-88
Integrity
- Hongxia Jin:

Higher Dependability and Security for Mobile Applications. 89-103 - Alexander Becher, Zinaida Benenson, Maximillian Dornseif:

Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. 104-118
Privacy and Security
- Michael Friedewald

, Elena Vildjiounaite, Yves Punie, David Wright:
The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues. 119-133 - Gerald Eichler, Matthias O. Will:

Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security. 134-148 - Jodie P. Boyer, Kaijun Tan, Carl A. Gunter:

Privacy Sensitive Location Information Systems in Smart Buildings. 149-164 - Leping Huang, Hiroshi Yamane, Kanta Matsuura

, Kaoru Sezaki:
Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. 165-180
Information Flow and Access Control
- Urs Hengartner, Peter Steenkiste

:
Securing Information Gateways with Derivation-Constrained Access Control. 181-195 - Dieter Hutter

, Melanie Volkamer:
Information Flow Control to Secure Dynamic Web Service Composition. 196-210
Authentication
- Siraj A. Shaikh

, Christos K. Dimitriadis:
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions. 211-226 - Michael J. Covington, Manoj R. Sastry, Deepak J. Manohar:

Attribute-Based Authentication Model for Dynamic Mobile Environments. 227-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














