researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2003
2004
2005
2006
Filter by Tag
[+]
OR
AND
NOT
1
C++
Java
Meta-Environment
Ruby
access control
analysis
architecture
context-aware
data-flow
design
e-science
meta-model
meta-objects
mobile
p2p
protocol
rule-based
security
systematic-approach
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Adam J. Lee
Adolf Hohl
Ajay Brar
Alexander Becher
Alf Zugenmaier
Bill Roscoe
Dieter Hutter
Howard Chivers
Irfan Zakiuddin
Jodie P. Boyer
John A. Clark
Marco Gruteser
Masayuki Terada
Michael Friedewald
Michael Goldsmith
Peter Steenkiste
Sadie Creese
Susan Stepney
Urs Hengartner
Yves Roudier
Filter by Top terms
[+]
OR
AND
NOT
1
access
authentication
communication
computing
control
devices
information
issues
location
mobile
networks
pervasive
privacy
protocol
secure
security
smart
systems
trust
using
SPC (spc)
Editions
Publications
Viewing Publication 1 - 66 from 66
2006
Delegating Secure Logging in Pervasive Computing Systems
Rafael Accorsi
,
Adolf Hohl
.
spc 2006
:
58-72
[doi]
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
Alexander Becher
,
Zinaida Benenson
,
Maximillian Dornseif
.
spc 2006
:
104-118
[doi]
Privacy Sensitive Location Information Systems in Smart Buildings
Jodie P. Boyer
,
Kaijun Tan
,
Carl A. Gunter
.
spc 2006
:
149-164
[doi]
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks
Jin Wook Byun
,
Su-Mi Lee
,
Dong-Hoon Lee
,
Dowon Hong
.
spc 2006
:
3-17
[doi]
Trust Without Identification
Howard Chivers
.
spc 2006
:
1-2
[doi]
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
John A. Clark
,
Richard F. Paige
,
Fiona A. C. Polack
,
Phillip J. Brooke
, editors,
Volume 3934 of
Lecture Notes in Computer Science
, Springer,
2006.
Attribute-Based Authentication Model for Dynamic Mobile Environments
Michael J. Covington
,
Manoj R. Sastry
,
Deepak J. Manohar
.
spc 2006
:
227-242
[doi]
Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security
Gerald Eichler
,
Matthias O. Will
.
spc 2006
:
134-148
[doi]
The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues
Michael Friedewald
,
Elena Vildjiounaite
,
Yves Punie
,
David Wright
.
spc 2006
:
119-133
[doi]
Securing Information Gateways with Derivation-Constrained Access Control
Urs Hengartner
,
Peter Steenkiste
.
spc 2006
:
181-195
[doi]
Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation
Leping Huang
,
Hiroshi Yamane
,
Kanta Matsuura
,
Kaoru Sezaki
.
spc 2006
:
165-180
[doi]
Information Flow Control to Secure Dynamic Web Service Composition
Dieter Hutter
,
Melanie Volkamer
.
spc 2006
:
196-210
[doi]
Higher Dependability and Security for Mobile Applications
Hongxia Jin
.
spc 2006
:
89-103
[doi]
Low Rate DoS Attack to Monoprocess Servers
Gabriel Maciá-Fernández
,
Jesús E. Díaz-Verdejo
,
Pedro Garcia-Teodoro
.
spc 2006
:
43-57
[doi]
Forward Secure Communication in Wireless Sensor Networks
Sjouke Mauw
,
Ivo van Vessem
,
Bert Bos
.
spc 2006
:
32-42
[doi]
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions
Siraj A. Shaikh
,
Christos K. Dimitriadis
.
spc 2006
:
211-226
[doi]
Enabling Secure Discovery in a Pervasive Environment
Slim Trabelsi
,
Jean-Christophe R. Pazzaglia
,
Yves Roudier
.
spc 2006
:
18-31
[doi]
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems
Bo-Yin Yang
,
Chen-Mou Cheng
,
Bor-rong Chen
,
Jiun-Ming Chen
.
spc 2006
:
73-88
[doi]
2005
Exploiting Empirical Engagement in Authentication Protocol Design
Sadie Creese
,
Michael Goldsmith
,
Richard Harrison
,
Bill Roscoe
,
Paul Whittaker
,
Irfan Zakiuddin
.
spc 2005
:
119-133
[doi]
Security Issues of Mobile Devices
Claudia Eckert
.
spc 2005
:
163
[doi]
EPC Technology
Christian Floerkemeier
,
Frédéric Thiesse
.
spc 2005
:
117-118
[doi]
Safeguards in a World of Ambient Intelligence
Michael Friedewald
.
spc 2005
:
63-69
[doi]
On the Anonymity of Periodic Location Samples
Marco Gruteser
,
Baik Hoh
.
spc 2005
:
179-192
[doi]
P2P Digital Value Fair Trading System Using Smart Cards
Masayuki Hanadate
,
Masayuki Terada
,
Shinji Nagao
,
Toshiyuki Miyazawa
,
Yukiko Yosuke
,
Seiji Tomita
,
Ko Fujimura
.
spc 2005
:
18-30
[doi]
Pervasive Computing - A Case for the Precautionary Principle?
Lorenz M. Hilty
.
spc 2005
:
1-2
[doi]
Secure Identity Management for Pseudo-Anonymous Service Access
Michael Hitchens
,
Judy Kay
,
Bob Kummerfeld
,
Ajay Brar
.
spc 2005
:
48-55
[doi]
Ephemeral Pairing on Anonymous Networks
Jaap-Henk Hoepman
.
spc 2005
:
101-116
[doi]
Look Who s Talking - Authenticating Service Access Points
Adolf Hohl
,
Lutz Lowis
,
Alf Zugenmaier
.
spc 2005
:
151-162
[doi]
Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
Dieter Hutter
,
Markus Ullmann
, editors,
Volume 3450 of
Lecture Notes in Computer Science
, Springer,
2005.
An Efficient Access Control Model for Mobile Ad-Hoc Communities
Sye Loong Keoh
,
Emil Lupu
.
spc 2005
:
210-224
[doi]
Security Issues for Pervasive Personalized Communication Systems
Bertin Klein
,
Tristan Miller
,
Sandra Zilles
.
spc 2005
:
56-62
[doi]
Privacy for Profitable Location Based Services
Tobias Kölsch
,
Lothar Fritsch
,
Markulf Kohlweiss
,
Dogan Kesdogan
.
spc 2005
:
164-178
[doi]
Security Concept of the EU-Passport
Dennis Kügler
.
spc 2005
:
85
[doi]
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
Adam J. Lee
,
Jodie P. Boyer
,
Chris Drexelius
,
Prasad Naldurg
,
Raquel L. Hill
,
Roy H. Campbell
.
spc 2005
:
134-150
[doi]
Devices Are People Too Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example
Yang Liu
,
John A. Clark
,
Susan Stepney
.
spc 2005
:
31-45
[doi]
TrustAC: Trust-Based Access Control for Pervasive Devices
Florina Almenárez Mendoza
,
Andrés Marín López
,
Celeste Campo
,
R. Carlos García
.
spc 2005
:
225-238
[doi]
Securing Ad Hoc Networks
Panagiotis Papadimitratos
.
spc 2005
:
46-47
[doi]
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
Keunwoo Rhee
,
Jin Kwak
,
Seungjoo Kim
,
Dongho Won
.
spc 2005
:
70-84
[doi]
Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks
Stefaan Seys
,
Bart Preneel
.
spc 2005
:
86-100
[doi]
TENeT: A Framework for Distributed Smartcards
Masayuki Terada
,
Kensaku Mori
,
Kazuhiko Ishii
,
Sadayuki Hongo
,
Tomonori Usaka
,
Noboru Koshizuka
,
Ken Sakamura
.
spc 2005
:
3-17
[doi]
A Theorem Proving Approach to Analysis of Secure Information Flow
Ádám Darvas
,
Reiner Hähnle
,
David Sands
.
spc 2005
:
193-209
[doi]
2004
Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers
Dieter Hutter
,
Günter Müller
,
Werner Stephan
,
Markus Ullmann
, editors,
Volume 2802 of
Lecture Notes in Computer Science
, Springer,
2004.
2003
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing
Kemal Bicakci
,
Nazife Baykal
.
spc 2004
:
187-200
[doi]
Dependability Issues of Pervasive Computing in a Healthcare Environment
Jürgen Bohn
,
Felix C. Gärtner
,
Harald Vogt
.
spc 2004
:
53-70
[doi]
Embedding Distance-Bounding Protocols within Intuitive Interactions
Laurent Bussard
,
Yves Roudier
.
spc 2004
:
143-156
[doi]
Smart Devices and Software Agents: The Basics of Good Behaviour
Howard Chivers
,
John A. Clark
,
Susan Stepney
.
spc 2004
:
39-52
[doi]
Authentication for Pervasive Computing
Sadie Creese
,
Michael Goldsmith
,
Bill Roscoe
,
Irfan Zakiuddin
.
spc 2004
:
116-129
[doi]
Enforcing Security Policies via Types
Daniele Gorla
,
Rosario Pugliese
.
spc 2004
:
86-100
[doi]
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic
Johann Großschädl
,
Guy-Armand Kamendje
.
spc 2004
:
253-270
[doi]
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
Marco Gruteser
,
Dirk Grunwald
.
spc 2004
:
10-24
[doi]
Protecting Access to People Location Information
Urs Hengartner
,
Peter Steenkiste
.
spc 2004
:
25-38
[doi]
Implementing a Formally Verifiable Security Protocol in Java Card
Engelbert Hubbers
,
Martijn Oostdijk
,
Erik Poll
.
spc 2004
:
213-226
[doi]
Security and Privacy in Pervasive Computing State of the Art and Future Directions
Dieter Hutter
,
Werner Stephan
,
Markus Ullmann
.
spc 2004
:
285-289
[doi]
The Importance of High Assurance Security in Pervasive Computing
Paul A. Karger
.
spc 2004
:
9
[doi]
Cellular Automata Based Multiplier for Public-Key Cryptosystem
Hyun-Sung Kim
,
Kee-Young Yoo
.
spc 2004
:
227-236
[doi]
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
Håkan Kvarnström
,
Hans Hedbom
,
Erland Jonsson
.
spc 2004
:
71-85
[doi]
Enlisting Hardware Architecture to Thwart Malicious Code Injection
Ruby B. Lee
,
David K. Karig
,
John Patrick McGregor
,
Zhijie Shi
.
spc 2004
:
237-252
[doi]
Time Constraint Delegation for P2P Data Decryption
Tieyan Li
.
spc 2004
:
173-186
[doi]
The Age of Pervasive Computing? Everything Smart, Everything Connected?
Friedemann Mattern
.
spc 2004
:
1
[doi]
Cyber Assist Project and Its Security Requirement
Hideyuki Nakashima
.
spc 2004
:
2-5
[doi]
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
Philip Robinson
,
Michael Beigl
.
spc 2004
:
157-172
[doi]
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
Axel Schairer
.
spc 2004
:
101-115
[doi]
End-to-End Trust Starts with Recognition
Jean-Marc Seigneur
,
Stephen Farrell
,
Christian Damsgaard Jensen
,
Elizabeth Gray
,
Yong Chen
.
spc 2004
:
130-142
[doi]
Security in Pervasive Computing
Frank Stajano
.
spc 2004
:
6-8
[doi]
Visual Crypto Displays Enabling Secure Communications
Pim Tuyls
,
Tom A. M. Kevenaar
,
Geert Jan Schrijen
,
Toine Staring
,
Marten van Dijk
.
spc 2004
:
271-284
[doi]
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
Stephen A. Weis
,
Sanjay E. Sarma
,
Ronald L. Rivest
,
Daniel W. Engels
.
spc 2004
:
201-212
[doi]
Sign in
or
sign up
to see more results.