


default search action
2. SPC 2005: Boppard, Germany
- Dieter Hutter, Markus Ullmann:
Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings. Lecture Notes in Computer Science 3450, Springer 2005, ISBN 3-540-25521-4
Invited Talk (Abstract)
- Lorenz M. Hilty
:
Pervasive Computing - A Case for the Precautionary Principle? 1-2
Smart Devices and Applications
- Masayuki Terada
, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura:
TENeT: A Framework for Distributed Smartcards. 3-17 - Masayuki Hanadate, Masayuki Terada, Shinji Nagao, Toshiyuki Miyazawa, Yukiko Yosuke, Seiji Tomita, Ko Fujimura:
P2P Digital Value Fair Trading System Using Smart Cards. 18-30 - Yang Liu, John A. Clark, Susan Stepney:
"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. 31-45
Invited Talk (Abstract)
- Panagiotis Papadimitratos
:
Securing Ad Hoc Networks. 46-47
Short Paper Session
- Michael Hitchens
, Judy Kay, Bob Kummerfeld, Ajay Brar:
Secure Identity Management for Pseudo-Anonymous Service Access. 48-55 - Bertin Klein, Tristan Miller, Sandra Zilles:
Security Issues for Pervasive Personalized Communication Systems. 56-62 - Michael Friedewald:
Safeguards in a World of Ambient Intelligence. 63-69
Authentication (I)
- Keunwoo Rhee, Jin Kwak, Seungjoo Kim
, Dongho Won:
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. 70-84
Invited Talk (Abstract)
- Dennis Kügler:
Security Concept of the EU-Passport. 85
Authentication (II)
- Stefaan Seys, Bart Preneel:
Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. 86-100 - Jaap-Henk Hoepman:
Ephemeral Pairing on Anonymous Networks. 101-116
Invited Talk (Abstract)
- Christian Floerkemeier, Frédéric Thiesse:
EPC Technology. 117-118
Authentication (III)
- Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin:
Exploiting Empirical Engagement in Authentication Protocol Design. 119-133 - Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell:
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. 134-150 - Adolf Hohl, Lutz Lowis, Alf Zugenmaier:
Look Who's Talking - Authenticating Service Access Points. 151-162
Invited Talk (Abstract)
- Claudia Eckert:
Security Issues of Mobile Devices. 163
Privacy and Anonymity
- Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss
, Dogan Kesdogan:
Privacy for Profitable Location Based Services. 164-178 - Marco Gruteser, Baik Hoh:
On the Anonymity of Periodic Location Samples. 179-192
Access Control and Information Flow
- Ádám Darvas, Reiner Hähnle, David Sands:
A Theorem Proving Approach to Analysis of Secure Information Flow. 193-209 - Sye Loong Keoh
, Emil Lupu:
An Efficient Access Control Model for Mobile Ad-Hoc Communities. 210-224 - Florina Almenárez
, Andrés Marín López, Celeste Campo, R. Carlos García:
TrustAC: Trust-Based Access Control for Pervasive Devices. 225-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.