Security in Pervasive Computing
Invited Talk.- Trust Without Identification.- Protocols.- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.- Enabling Secure Discovery in a Pervasive Environment.- Forward Secure Communication in Wireless Sensor Networks.- Mechanisms.- Low Rate DoS Attack to Monoprocess Servers.- Delegating Secure Logging in Pervasive Computing Systems.- Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.- Integrity.- Higher Dependability and Security for Mobile Applications.- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.- Privacy and Security.- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues.- Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security.- Privacy Sensitive Location Information Systems in Smart Buildings.- Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation.- Information Flow and Access Control.- Securing Information Gateways with Derivation-Constrained Access Control.- Information Flow Control to Secure Dynamic Web Service Composition.- Authentication.- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.- Attribute-Based Authentication Model for Dynamic Mobile Environments.
| Erscheint lt. Verlag | 10.4.2006 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 243 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 820 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Attribut • authentication • Communications Security • cryptographic protocols • Data Security • denial of service • Embedded Systems • Identity • information flow • Internet Security • Middleware • mobile computing • Mobile Devices • Pervasive Computing • privacy • Public-Key Cryptosystems • QoS • Secure Networking • Security Policies • Trust • ubiquitous computing • web security |
| ISBN-13 | 9783540333760 / 9783540333760 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich