Bookbot

Security in pervasive computing

Más información sobre el libro

Inhaltsverzeichnis Invited Talk (Abstract). Pervasive Computing – A Case for the Precautionary Principle?. Session 1: Smart Devices and Applications. TENeT: A Framework for Distributed Smartcards. P2P Digital Value Fair Trading System Using Smart Cards. “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. Securing Ad Hoc Networks. Session 2: Short Paper Session. Secure Identity Management for Pseudo-Anonymous Service Access. Security Issues for Pervasive Personalized Communication Systems. Safeguards in a World of Ambient Intelligence. Session 3: Authentication (I). Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. Security Concept of the EU-Passport. Session 4: Authentication (II). Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. Ephemeral Pairing on Anonymous Networks. EPC Technology. Session 5: Authentication (III). Exploiting Empirical Engagement in Authentication Protocol Design. Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. Look Who’s Talking – Authenticating Service Access Points. Security Issues of Mobile Devices. Session 6: Privacy and Anonymity. Privacy for Profitable Location Based Services. On the Anonymity of Periodic Location Samples. Session 7: Access Control and Information Flow. A Theorem Proving Approach to Analysis of

Publicación

Compra de libros

Security in pervasive computing, Dieter Hutter

Idioma
Publicado en
2005
product-detail.submit-box.info.binding
(Tapa blanda)
Te avisaremos por correo electrónico en cuanto lo localicemos.

Métodos de pago

Nadie lo ha calificado todavía.Añadir reseña