researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2006
2007
Filter by Tag
OR
AND
NOT
1
C++
Meta-Environment
architecture
design
e-science
information hiding
meta-model
meta-objects
mobile
open-source
protocol
rule-based
security
semantic web
source-to-source
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
A. Apostolopoulos
A. Karygiannis
Alexandros Tsakountakis
Antonino Mazzeo
Arturo Ribagorda
Bert Bos
Bogdan Groza
C. Delakouridis
Christian Schaefer
Dimitris Zisiadis
Dirk Henrici
Dong-Hoon Lee
E. Antonakakis
Eduard Hasenleithner
Emmanuel Hooper
Emmanuelle Dottax
Eun Young Choi
Javier Lopez
Rodrigo Roman
Zheng Yan
Filter by Top terms
[+]
OR
AND
NOT
1
architecture
attacks
authentication
component
computing
cryptographic
detection
effective
mobile
network
networks
pervasive
privacy
rfid
secure
security
sensor
systems
trust
wireless
SecPerU (secperu)
Editions
Publications
Viewing Publication 1 - 34 from 34
2007
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON
Bert Bos
,
Lukasz Chmielewski
,
Jaap-Henk Hoepman
,
Thanh Son Nguyen
.
secperu 2007
:
7-12
[doi]
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks
Ji Young Chun
,
Yong Ho Kim
,
Jongin Lim
,
Dong-Hoon Lee
.
secperu 2007
:
31-36
[doi]
A Security-by-Contract Architecture for Pervasive Services
Nicola Dragoni
,
Fabio Massacci
,
Christian Schaefer
,
Thomas Walter
,
Eric Vetillard
.
secperu 2007
:
49-54
[doi]
A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks
M. Carmen Fernández Gago
,
Rodrigo Roman
,
Javier Lopez
.
secperu 2007
:
25-30
[doi]
Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007
Panagiotis Georgiadis
,
Javier Lopez
,
Stefanos Gritzalis
,
Giannis F. Marias
, editors,
IEEE Computer Society,
2007.
[doi]
Secure Routing in Integrated Mobile Ad hoc Network (MANET)-Internet
Ramanarayana Kandikattu
,
Lillykutty Jacob
.
secperu 2007
:
19-24
[doi]
Secure Mobile RFID system against privacy and security problems
Il-Jung Kim
,
Eun Young Choi
,
Dong-Hoon Lee
.
secperu 2007
:
67-72
[doi]
Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags
Hwaseong Lee
,
Eun Young Choi
,
Su-Mi Lee
,
Dong-Hoon Lee
.
secperu 2007
:
73-78
[doi]
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags
Pedro Peris-Lopez
,
Julio C. Hernandez-Castro
,
Juan M. Estévez-Tapiador
,
Arturo Ribagorda
.
secperu 2007
:
55-60
[doi]
A New Certificate Signature for Pervasive Environment
Rachid Saadi
,
Jean-Marc Pierson
,
Lionel Brunie
.
secperu 2007
:
43-48
[doi]
Usage Control Reference Monitor Architecture
Christian Schaefer
.
secperu 2007
:
13-18
[doi]
Towards effective Wireless Intrusion Detection in IEEE 802.11i
Alexandros Tsakountakis
,
Georgios Kambourakis
,
Stefanos Gritzalis
.
secperu 2007
:
37-42
[doi]
Storage-Awareness: RFID Private Authentication based on Sparse Tree
Weijia Wang
,
Yong Li 0002
,
Lei Hu
,
Li Lu
.
secperu 2007
:
61-66
[doi]
Identity Based Private Matching
Zhongsheng Wu
,
Zhide Chen
,
Fuchun Guo
,
Li Xu
.
secperu 2007
:
85-90
[doi]
Predicting Trustworthiness for Component Software
Zheng Yan
.
secperu 2007
:
1-6
[doi]
An Architecture for Secure VoIP and Collaboration Applications
Dimitris Zisiadis
,
Spyros Kopsidas
,
Leandros Tassiulas
.
secperu 2007
:
79-84
[doi]
2006
Additional Reviewers
secperu 2006
:
[doi]
Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France
IEEE Computer Society,
2006.
Technical Program Committee
secperu 2006
:
[doi]
Welcome Message
secperu 2006
:
[doi]
Pervasive Trusted Computing
Shane Balfe
,
Shiqun Li
,
Jianying Zhou
.
secperu 2006
:
88-94
[doi]
An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web
Vangelis G. Bintzios
,
Thanasis G. Papaioannou
,
George D. Stamoulis
.
secperu 2006
:
69-74
[doi]
HB:::++:::: a Lightweight Authentication Protocol Secure against Some Attacks
Julien Bringer
,
Hervé Chabanne
,
Emmanuelle Dottax
.
secperu 2006
:
28-33
[doi]
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
Valentina Casola
,
Luigi Coppolino
,
Antonino Mazzeo
,
Nicola Mazzocca
,
Massimiliano Rak
.
secperu 2006
:
34-40
[doi]
Using One-Way Chains to Provide Message Authentication without Shared Secrets
Bogdan Groza
.
secperu 2006
:
82-87
[doi]
A Hash-based Pseudonymization Infrastructure for RFID Systems
Dirk Henrici
,
Joachim Götze
,
Paul Müller
.
secperu 2006
:
22-27
[doi]
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS
Emmanuel Hooper
.
secperu 2006
:
16-21
[doi]
Enhanced Privacy in Key-Exchange Protocols by One-time ID
Kenji Imamoto
,
Kouichi Sakurai
.
secperu 2006
:
63-68
[doi]
Detecting Critical Nodes for MANET Intrusion Detection Systems
A. Karygiannis
,
E. Antonakakis
,
A. Apostolopoulos
.
secperu 2006
:
7-15
[doi]
iHIDE: Hiding Sources of Information in WSNs
L. Kazatzopoulos
,
C. Delakouridis
,
Giannis F. Marias
,
Panagiotis Georgiadis
.
secperu 2006
:
41-48
[doi]
Service-Oriented Security Architecture for CII based on Sensor Networks
Javier Lopez
,
José A. Montenegro
,
Rodrigo Roman
.
secperu 2006
:
1-6
[doi]
On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors
Milan Markovic
,
Goran Dordevic
.
secperu 2006
:
57-62
[doi]
On the Impact of Unwanted Traffic onto a 3G Network
Fabio Ricciato
,
Philipp Svoboda
,
Eduard Hasenleithner
,
Wolfgang Fleischer
.
secperu 2006
:
49-56
[doi]
A Conceptual Architecture of a Trusted Mobile Environment
Zheng Yan
.
secperu 2006
:
75-81
[doi]
Sign in
or
sign up
to see more results.