default search action
3. SPC 2006: York, UK
- John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke:
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings. Lecture Notes in Computer Science 3934, Springer 2006, ISBN 3-540-33376-2
Invited Talk
- Howard Chivers:
Trust Without Identification. 1-2
Protocols
- Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong:
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. 3-17 - Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier:
Enabling Secure Discovery in a Pervasive Environment. 18-31 - Sjouke Mauw, Ivo van Vessem, Bert Bos:
Forward Secure Communication in Wireless Sensor Networks. 32-42
Mechanisms
- Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Low Rate DoS Attack to Monoprocess Servers. 43-57 - Rafael Accorsi, Adolf Hohl:
Delegating Secure Logging in Pervasive Computing Systems. 58-72 - Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen:
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. 73-88
Integrity
- Hongxia Jin:
Higher Dependability and Security for Mobile Applications. 89-103 - Alexander Becher, Zinaida Benenson, Maximillian Dornseif:
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. 104-118
Privacy and Security
- Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright:
The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues. 119-133 - Gerald Eichler, Matthias O. Will:
Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security. 134-148 - Jodie P. Boyer, Kaijun Tan, Carl A. Gunter:
Privacy Sensitive Location Information Systems in Smart Buildings. 149-164 - Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki:
Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. 165-180
Information Flow and Access Control
- Urs Hengartner, Peter Steenkiste:
Securing Information Gateways with Derivation-Constrained Access Control. 181-195 - Dieter Hutter, Melanie Volkamer:
Information Flow Control to Secure Dynamic Web Service Composition. 196-210
Authentication
- Siraj A. Shaikh, Christos K. Dimitriadis:
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions. 211-226 - Michael J. Covington, Manoj R. Sastry, Deepak J. Manohar:
Attribute-Based Authentication Model for Dynamic Mobile Environments. 227-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.