𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers

✍ Scribed by Friedemann Mattern (auth.), Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2004
Tongue
English
Leaves
446
Series
Lecture Notes in Computer Science 2802
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003.

The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefully selected during two rounds of reviewing and improvements. The papers are organized in topical sections on location privacy, security requirements, security policies and protection, authentication and trust, secure infrastructures, smart labels, verifications, and hardware architectures.

✦ Table of Contents


Front Matter....Pages -
The Age of Pervasive Computing – Everything Smart, Everything Connected?....Pages 1-1
Cyber Assist Project and Its Security Requirement....Pages 2-5
Security in Pervasive Computing....Pages 6-8
The Importance of High Assurance Security in Pervasive Computing....Pages 9-9
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks....Pages 10-24
Protecting Access to People Location Information....Pages 25-38
Smart Devices and Software Agents: The Basics of Good Behaviour....Pages 39-52
Dependability Issues of Pervasive Computing in a Healthcare Environment....Pages 53-70
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions....Pages 71-85
Enforcing Security Policies via Types....Pages 86-100
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems....Pages 101-115
Authentication for Pervasive Computing....Pages 116-129
End-to-End Trust Starts with Recognition....Pages 130-142
Embedding Distance-Bounding Protocols within Intuitive Interactions....Pages 143-156
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments....Pages 157-172
Time Constraint Delegation for P2P Data Decryption....Pages 173-186
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing....Pages 187-200
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems....Pages 201-212
Implementing a Formally Verifiable Security Protocol in Java Card....Pages 213-226
Cellular Automata Based Multiplier for Public-Key Cryptosystem....Pages 227-236
Enlisting Hardware Architecture to Thwart Malicious Code Injection....Pages 237-252
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic....Pages 253-270
Visual Crypto Displays Enabling Secure Communications....Pages 271-284
Security and Privacy in Pervasive Computing State of the Art and Future Directions....Pages 285-289
Back Matter....Pages -

✦ Subjects


Computer Communication Networks; Software Engineering; Operating Systems; Data Encryption; Information Systems Applications (incl.Internet); Computers and Society


πŸ“œ SIMILAR VOLUMES


Security in Pervasive Computing: Second
✍ Lorenz M. Hilty (auth.), Dieter Hutter, Markus Ullmann (eds.) πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, Germany in April 2005.</P><P>The 14 revised full papers and 3 revised short papers presented together with abstracts of 5 invited talks were careful

Mathematics and Computation in Music: Fi
✍ Timour Klouche, Thomas Noll πŸ“‚ Library πŸ“… 2009 πŸ› Springer 🌐 English

This book constitutes the refereed proceedings of the First International Conference on Mathematics and Computation in Music, MCM 2007, held in Berlin, Germany, in May 2007. The 51 papers presented were carefully reviewed and selected from numerous submissions. The MCM conference is the flagship co

Computer and Communication Engineering:
✍ Filippo Neri (editor), Ke-Lin Du (editor), Vijayakumar Varadarajan (editor), Ang πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<span>This book constitutes refereed proceedings of the Third International Conference on Computer and Communication Engineering, CCCE 2023, held in Stockholm, Sweden, in March 2023.<br>The 18 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in

Pervasive Computing: Third International
✍ James Scott, Boris Dragovic (auth.), Hans -W. Gellersen, Roy Want, Albrecht Schm πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- p