Bitte haben Sie einen Moment Geduld, wir legen Ihr Produkt in den Warenkorb.
Bitte haben Sie einen Moment Geduld, wir legen Ihr Produkt in den Warenkorb.
| Reihe | Lecture Notes in Computer Science |
|---|---|
| Themen | Informatik und Informationstechnologie Allgemeine Themen Soziale und ethische Aspekte |
| ISBN | 9783540208877 |
| Sprache | Englisch |
| Erscheinungsdatum | 26.01.2004 |
| Größe | 235 x 155 mm |
| Verlag | Springer |
| Herausgegeben von | Markus Ullmann, Dieter Hutter, Werner Stephan, Günter Müller |
| Lieferzeit | Lieferung in 7-14 Werktagen |
| Herstellerangaben | Anzeigen Europaplatz 3 | DE-69115 Heidelberg ProductSafety@springernature.com |
Invited Talks (Abstracts).- The Age of Pervasive Computing - Everything Smart, Everything Connected?.- Cyber Assist Project and Its Security Requirement.- Security in Pervasive Computing.- The Importance of High Assurance Security in Pervasive Computing.- Location Privacy.- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks.- Protecting Access to People Location Information.- Security Requirements.- Smart Devices and Software Agents: The Basics of Good Behaviour.- Dependability Issues of Pervasive Computing in a Healthcare Environment.- Security Policies and Protection.- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.- Enforcing Security Policies via Types.- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems.- Authentication and Trust.- Authentication for Pervasive Computing.- End-to-End Trust Starts with Recognition.- Embedding Distance-Bounding Protocols within Intuitive Interactions.- Secure Infrastructures.- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments.- Time Constraint Delegation for P2P Data Decryption.- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.- Smart Labels.- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.- Verification.- Implementing a Formally Verifiable Security Protocol in Java Card.- Hardware Architectures.- Cellular Automata Based Multiplier for Public-Key Cryptosystem.- Enlisting Hardware Architecture to Thwart Malicious Code Injection.- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic.- Visual Crypto Displays Enabling Secure Communications.- Workshop.- Security and Privacy in Pervasive Computing State of the Artand Future Directions.
| Reihe | Lecture Notes in Computer Science |
|---|---|
| Themen | Informatik und Informationstechnologie Allgemeine Themen Soziale und ethische Aspekte |
| ISBN | 9783540208877 |
| Sprache | Englisch |
| Erscheinungsdatum | 26.01.2004 |
| Größe | 235 x 155 mm |
| Verlag | Springer |
| Herausgegeben von | Markus Ullmann, Dieter Hutter, Werner Stephan, Günter Müller |
| Lieferzeit | Lieferung in 7-14 Werktagen |
| Herstellerangaben | Anzeigen Europaplatz 3 | DE-69115 Heidelberg ProductSafety@springernature.com |
Wie gefällt Ihnen unser Shop?