Security in Pervasive Computing
Springer Berlin (Verlag)
978-3-540-33376-0 (ISBN)
Invited Talk.- Trust Without Identification.- Protocols.- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.- Enabling Secure Discovery in a Pervasive Environment.- Forward Secure Communication in Wireless Sensor Networks.- Mechanisms.- Low Rate DoS Attack to Monoprocess Servers.- Delegating Secure Logging in Pervasive Computing Systems.- Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.- Integrity.- Higher Dependability and Security for Mobile Applications.- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.- Privacy and Security.- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues.- Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security.- Privacy Sensitive Location Information Systems in Smart Buildings.- Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation.- Information Flow and Access Control.- Securing Information Gateways with Derivation-Constrained Access Control.- Information Flow Control to Secure Dynamic Web Service Composition.- Authentication.- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.- Attribute-Based Authentication Model for Dynamic Mobile Environments.
Erscheint lt. Verlag | 10.4.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 243 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 820 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Attribut • authentication • Communications Security • cryptographic protocols • Data Security • denial of service • Embedded Systems • Identity • information flow • Internet Security • Middleware • mobile computing • Mobile Devices • Pervasive Computing • privacy • Public-Key Cryptosystems • QoS • Secure Networking • Security Policies • Trust • ubiquitous computing • web security |
ISBN-10 | 3-540-33376-2 / 3540333762 |
ISBN-13 | 978-3-540-33376-0 / 9783540333760 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich