Bitte haben Sie einen Moment Geduld, wir legen Ihr Produkt in den Warenkorb.
Bitte haben Sie einen Moment Geduld, wir legen Ihr Produkt in den Warenkorb.
| Reihe | Lecture Notes in Computer Science |
|---|---|
| Themen | Informatik und Informationstechnologie Allgemeine Themen Soziale und ethische Aspekte |
| ISBN | 9783540255215 |
| Sprache | Englisch |
| Erscheinungsdatum | 30.03.2005 |
| Größe | 235 x 155 mm |
| Verlag | Springer |
| Herausgegeben von | Dieter Hutter, Markus Ullmann |
| Lieferzeit | Lieferung in 7-14 Werktagen |
| Herstellerangaben | Anzeigen Europaplatz 3 | DE-69115 Heidelberg ProductSafety@springernature.com |
Invited Talk (Abstract).- Pervasive Computing - A Case for the Precautionary Principle?.- Session 1: Smart Devices and Applications.- TENeT: A Framework for Distributed Smartcards.- P2P Digital Value Fair Trading System Using Smart Cards.- "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.- Invited Talk (Abstract).- Securing Ad Hoc Networks.- Session 2: Short Paper Session.- Secure Identity Management for Pseudo-Anonymous Service Access.- Security Issues for Pervasive Personalized Communication Systems.- Safeguards in a World of Ambient Intelligence.- Session 3: Authentication (I).- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.- Invited Talk (Abstract).- Security Concept of the EU-Passport.- Session 4: Authentication (II).- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.- Ephemeral Pairing on Anonymous Networks.- Invited Talk (Abstract).- EPC Technology.- Session 5: Authentication (III).- Exploiting Empirical Engagement in Authentication Protocol Design.- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.- Look Who's Talking - Authenticating Service Access Points.- Invited Talk (Abstract).- Security Issues of Mobile Devices.- Session 6: Privacy and Anonymity.- Privacy for Profitable Location Based Services.- On the Anonymity of Periodic Location Samples.- Session 7: Access Control and Information Flow.- A Theorem Proving Approach to Analysis of Secure Information Flow.- An Efficient Access Control Model for Mobile Ad-Hoc Communities.- TrustAC: Trust-Based Access Control for Pervasive Devices.
| Reihe | Lecture Notes in Computer Science |
|---|---|
| Themen | Informatik und Informationstechnologie Allgemeine Themen Soziale und ethische Aspekte |
| ISBN | 9783540255215 |
| Sprache | Englisch |
| Erscheinungsdatum | 30.03.2005 |
| Größe | 235 x 155 mm |
| Verlag | Springer |
| Herausgegeben von | Dieter Hutter, Markus Ullmann |
| Lieferzeit | Lieferung in 7-14 Werktagen |
| Herstellerangaben | Anzeigen Europaplatz 3 | DE-69115 Heidelberg ProductSafety@springernature.com |
Wie gefällt Ihnen unser Shop?