Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers: First Internat by Dieter HutterSecurity in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers: First Internat by Dieter Hutter

Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14…

byDieter HutterEditorGünter Müller, Werner Stephan

Paperback | January 26, 2004

Pricing and Purchase Info

$114.32 online 
$136.95 list price save 16%
Earn 572 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003. The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefully selected during two rounds of reviewing and improvements. The papers are organized in topical sections on location privacy, security requirements, security policies and protection, authentication and trust, secure infrastructures, smart labels, verifications, and hardware architectures.
Title:Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14…Format:PaperbackDimensions:296 pages, 23.5 × 15.5 × 0.01 inPublished:January 26, 2004Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540208879

ISBN - 13:9783540208877

Look for similar items by category:

Reviews

Table of Contents

Invited Talks (Abstracts).- The Age of Pervasive Computing - Everything Smart, Everything Connected?.- Cyber Assist Project and Its Security Requirement.- Security in Pervasive Computing.- The Importance of High Assurance Security in Pervasive Computing.- Location Privacy.- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks.- Protecting Access to People Location Information.- Security Requirements.- Smart Devices and Software Agents: The Basics of Good Behaviour.- Dependability Issues of Pervasive Computing in a Healthcare Environment.- Security Policies and Protection.- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.- Enforcing Security Policies via Types.- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems.- Authentication and Trust.- Authentication for Pervasive Computing.- End-to-End Trust Starts with Recognition.- Embedding Distance-Bounding Protocols within Intuitive Interactions.- Secure Infrastructures.- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments.- Time Constraint Delegation for P2P Data Decryption.- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.- Smart Labels.- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.- Verification.- Implementing a Formally Verifiable Security Protocol in Java Card.- Hardware Architectures.- Cellular Automata Based Multiplier for Public-Key Cryptosystem.- Enlisting Hardware Architecture to Thwart Malicious Code Injection.- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic.- Visual Crypto Displays Enabling Secure Communications.- Workshop.- Security and Privacy in Pervasive Computing State of the Art and Future Directions.