05114nam 22007815 450 99646581270331620200705085727.010.1007/b135497(CKB)1000000000212909(SSID)ssj0000319948(PQKBManifestationID)11243388(PQKBTitleCode)TC0000319948(PQKBWorkID)10343197(PQKB)11659491(DE-He213)978-3-540-32004-3(MiAaPQ)EBC3067610(PPN)123093759(EXLCZ)99100000000021290920100709d2005 u| 0engurnn|008mamaatxtccrSecurity in Pervasive Computing[electronic resource] Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings /edited by Dieter Hutter, Markus Ullmann1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XI, 239 p.) Security and Cryptology ;3450Bibliographic Level Mode of Issuance: MonographPrinted edition: 9783540255215 Includes bibliographical references and index.Invited Talk (Abstract) -- Pervasive Computing – A Case for the Precautionary Principle? -- Session 1: Smart Devices and Applications -- TENeT: A Framework for Distributed Smartcards -- P2P Digital Value Fair Trading System Using Smart Cards -- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example -- Invited Talk (Abstract) -- Securing Ad Hoc Networks -- Session 2: Short Paper Session -- Secure Identity Management for Pseudo-Anonymous Service Access -- Security Issues for Pervasive Personalized Communication Systems -- Safeguards in a World of Ambient Intelligence -- Session 3: Authentication (I) -- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment -- Invited Talk (Abstract) -- Security Concept of the EU-Passport -- Session 4: Authentication (II) -- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks -- Ephemeral Pairing on Anonymous Networks -- Invited Talk (Abstract) -- EPC Technology -- Session 5: Authentication (III) -- Exploiting Empirical Engagement in Authentication Protocol Design -- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems -- Look Who’s Talking – Authenticating Service Access Points -- Invited Talk (Abstract) -- Security Issues of Mobile Devices -- Session 6: Privacy and Anonymity -- Privacy for Profitable Location Based Services -- On the Anonymity of Periodic Location Samples -- Session 7: Access Control and Information Flow -- A Theorem Proving Approach to Analysis of Secure Information Flow -- An Efficient Access Control Model for Mobile Ad-Hoc Communities -- TrustAC: Trust-Based Access Control for Pervasive Devices.Security and Cryptology ;3450Computer communication systemsSoftware engineeringOperating systems (Computers)Computers and civilizationManagement information systemsComputer scienceUser interfaces (Computer systems)Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067User Interfaces and Human Computer Interactionhttps://scigraph.springernature.com/ontologies/product-market-codes/I18067Computer communication systems.Software engineering.Operating systems (Computers).Computers and civilization.Management information systems.Computer science.User interfaces (Computer systems).Computer Communication Networks.Software Engineering.Operating Systems.Computers and Society.Management of Computing and Information Systems.User Interfaces and Human Computer Interaction.005.8Hutter Dieteredthttp://id.loc.gov/vocabulary/relators/edtUllmann Markusedthttp://id.loc.gov/vocabulary/relators/edtInternational Conference on Security in Pervasive ComputingBOOK996465812703316Security in Pervasive Computing771908UNISA