LEADER 06556nam 22008175 450 001 996466124203316 005 20200703232638.0 010 $a3-540-33377-0 024 7 $a10.1007/11734666 035 $a(CKB)1000000000232922 035 $a(SSID)ssj0000319949 035 $a(PQKBManifestationID)11255874 035 $a(PQKBTitleCode)TC0000319949 035 $a(PQKBWorkID)10338758 035 $a(PQKB)10776497 035 $a(DE-He213)978-3-540-33377-7 035 $a(MiAaPQ)EBC3067957 035 $z(PPN)204537088 035 $a(PPN)123133432 035 $a(EXLCZ)991000000000232922 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in Pervasive Computing$b[electronic resource] $eThird International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings /$fedited by John A. Clark, Richard F. Paige, Fiona A.C. Polack, Phillip J. Brooke 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 243 p.) 225 1 $aSecurity and Cryptology ;$v3934 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-33376-2 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- Trust Without Identification -- Protocols -- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems -- Integrity -- Higher Dependability and Security for Mobile Applications -- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks -- Privacy and Security -- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues -- Profiles and Context Awareness for Mobile Users ? A Middleware Approach Supporting Personal Security -- Privacy Sensitive Location Information Systems in Smart Buildings -- Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation -- Information Flow and Access Control -- Securing Information Gateways with Derivation-Constrained Access Control -- Information Flow Control to Secure Dynamic Web Service Composition -- Authentication -- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication Model for Dynamic Mobile Environments. 330 $aThis volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19?21, 2006 in York, UK. The conference focused on methods, tools, principles, and practices for assessing and achievingsecurityinapervasiveenvironment.Newsecurityconceptswerediscussed,in domains and applications such as handheld devices, mobile phones, smartcards, RFID chips, and smart labels, as well as new, emerging technological spaces. The conf- ence also presented work on fundamental themes such as risk identi?cation and mi- gation,security policies for pervasiveenvironments,privacymeasures (especially cr- tographic protocols), and mobility and location-aware services. Submissions included work on biometrics, ambient intelligence, Web services, security requirements, and many other topics. We received 56 submissions, and accepted 16 full papers for presentation. Each submission was reviewed by the international Programme Committee. We are grateful to the Programme Committee members, and the additional reviewers, for their timely completion of the reviewing process, and for the quality and detail of their reviews and discussion. Our thanks go to all members of the ProgrammeCommittee for their efforts; the - ditional reviewers; the authors, for submitting their papers; the keynote speaker, Frank Stajano; the invited speaker, Howard Chivers; and the Department of Computer S- ence, University of York, for supporting the event. April 2006 John A. Clark (Program Chair) Richard F. Paige Fiona A.C. Polack Phillip J. Brooke Organization SPC 2006 was organized by the Department of Computer Science, University of York. 410 0$aSecurity and Cryptology ;$v3934 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aSoftware engineering 606 $aOperating systems (Computers) 606 $aComputers and civilization 606 $aUser interfaces (Computer systems) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aSoftware engineering. 615 0$aOperating systems (Computers). 615 0$aComputers and civilization. 615 0$aUser interfaces (Computer systems). 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aOperating Systems. 615 24$aComputers and Society. 615 24$aUser Interfaces and Human Computer Interaction. 676 $a005.82 702 $aClark$b John A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPaige$b Richard F$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPolack$b Fiona A.C$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBrooke$b Phillip J$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Security in Pervasive Computing 906 $aBOOK 912 $a996466124203316 996 $aSecurity in Pervasive Computing$9771908 997 $aUNISA