default search action
2. SecPerU 2006: Lyon, France
- Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France. IEEE Computer Society 2006, ISBN 0-7695-2549-0
- Welcome Message.
- Technical Program Committee.
- Additional Reviewers.
- Javier López, José A. Montenegro, Rodrigo Roman:
Service-Oriented Security Architecture for CII based on Sensor Networks. 1-6 - A. Karygiannis, E. Antonakakis, A. Apostolopoulos:
Detecting Critical Nodes for MANET Intrusion Detection Systems. 7-15 - Emmanuel Hooper:
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. 16-21 - Dirk Henrici, Joachim Götze, Paul Müller:
A Hash-based Pseudonymization Infrastructure for RFID Systems. 22-27 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax:
HB++: a Lightweight Authentication Protocol Secure against Some Attacks. 28-33 - Valentina Casola, Luigi Coppolino, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak:
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems. 34-40 - Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias, Panagiotis Georgiadis:
iHIDE: Hiding Sources of Information in WSNs. 41-48 - Fabio Ricciato, Philipp Svoboda, Eduard Hasenleithner, Wolfgang Fleischer:
On the Impact of Unwanted Traffic onto a 3G Network. 49-56 - Milan Markovic, Goran Dordevic:
On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors. 57-62 - Kenji Imamoto, Kouichi Sakurai:
Enhanced Privacy in Key-Exchange Protocols by One-time ID. 63-68 - Vangelis G. Bintzios, Thanasis G. Papaioannou, George D. Stamoulis:
An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web. 69-74 - Zheng Yan:
A Conceptual Architecture of a Trusted Mobile Environment. 75-81 - Bogdan Groza:
Using One-Way Chains to Provide Message Authentication without Shared Secrets. 82-87 - Shane Balfe, Shiqun Li, Jianying Zhou:
Pervasive Trusted Computing. 88-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.