
×
Security in Pervasive Computing
Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
herausgegeben von Dieter Hutter und Markus UllmannInhaltsverzeichnis
- Invited Talk (Abstract).
- Pervasive Computing – A Case for the Precautionary Principle?.
- Session 1: Smart Devices and Applications.
- TENeT: A Framework for Distributed Smartcards.
- P2P Digital Value Fair Trading System Using Smart Cards.
- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.
- Securing Ad Hoc Networks.
- Session 2: Short Paper Session.
- Secure Identity Management for Pseudo-Anonymous Service Access.
- Security Issues for Pervasive Personalized Communication Systems.
- Safeguards in a World of Ambient Intelligence.
- Session 3: Authentication (I).
- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
- Security Concept of the EU-Passport.
- Session 4: Authentication (II).
- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.
- Ephemeral Pairing on Anonymous Networks.
- EPC Technology.
- Session 5: Authentication (III).
- Exploiting Empirical Engagement in Authentication Protocol Design.
- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.
- Look Who’s Talking – Authenticating Service Access Points.
- Security Issues of Mobile Devices.
- Session 6: Privacy and Anonymity.
- Privacy for Profitable Location Based Services.
- On the Anonymity of Periodic Location Samples.
- Session 7: Access Control and Information Flow.
- A Theorem Proving Approach to Analysis of Secure Information Flow.
- An Efficient Access Control Model for Mobile Ad-Hoc Communities.
- TrustAC: Trust-Based Access Control for Pervasive Devices.