Security in Pervasive Computing
Invited Talks (Abstracts).- The Age of Pervasive Computing - Everything Smart, Everything Connected?.- Cyber Assist Project and Its Security Requirement.- Security in Pervasive Computing.- The Importance of High Assurance Security in Pervasive Computing.- Location Privacy.- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks.- Protecting Access to People Location Information.- Security Requirements.- Smart Devices and Software Agents: The Basics of Good Behaviour.- Dependability Issues of Pervasive Computing in a Healthcare Environment.- Security Policies and Protection.- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.- Enforcing Security Policies via Types.- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems.- Authentication and Trust.- Authentication for Pervasive Computing.- End-to-End Trust Starts with Recognition.- Embedding Distance-Bounding Protocols within Intuitive Interactions.- Secure Infrastructures.- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments.- Time Constraint Delegation for P2P Data Decryption.- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.- Smart Labels.- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.- Verification.- Implementing a Formally Verifiable Security Protocol in Java Card.- Hardware Architectures.- Cellular Automata Based Multiplier for Public-Key Cryptosystem.- Enlisting Hardware Architecture to Thwart Malicious Code Injection.- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic.- Visual Crypto Displays Enabling Secure Communications.- Workshop.- Security and Privacy in Pervasive Computing State of the Artand Future Directions.
| Erscheint lt. Verlag | 26.1.2004 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XII, 296 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 460 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | authentication • Communications Security • Data Security • Delegation • handhelds • Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke • HC/Informatik, EDV/Datenkommunikation, Netzwerke • HC/Informatik, EDV/Informatik • Healthcare • Identification • Information • Internet Security • Java • java card • mobile computing • Mobile Devices • Pervasive Computing • Secure Networking • security • Smartcards • Trust • ubiquitous computing • web security • wireless network security |
| ISBN-13 | 9783540208877 / 9783540208877 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich