Abstract is missing.
- The Age of Pervasive Computing? Everything Smart, Everything Connected?Friedemann Mattern. 1 [doi]
- Cyber Assist Project and Its Security RequirementHideyuki Nakashima. 2-5 [doi]
- Security in Pervasive ComputingFrank Stajano. 6-8 [doi]
- The Importance of High Assurance Security in Pervasive ComputingPaul A. Karger. 9 [doi]
- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot NetworksMarco Gruteser, Dirk Grunwald. 10-24 [doi]
- Protecting Access to People Location InformationUrs Hengartner, Peter Steenkiste. 25-38 [doi]
- Smart Devices and Software Agents: The Basics of Good BehaviourHoward Chivers, John A. Clark, Susan Stepney. 39-52 [doi]
- Dependability Issues of Pervasive Computing in a Healthcare EnvironmentJürgen Bohn, Felix C. Gärtner, Harald Vogt. 53-70 [doi]
- Protecting Security Policies in Ubiquitous Environments Using One-Way FunctionsHåkan Kvarnström, Hans Hedbom, Erland Jonsson. 71-85 [doi]
- Enforcing Security Policies via TypesDaniele Gorla, Rosario Pugliese. 86-100 [doi]
- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent SystemsAxel Schairer. 101-115 [doi]
- Authentication for Pervasive ComputingSadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin. 116-129 [doi]
- End-to-End Trust Starts with RecognitionJean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen. 130-142 [doi]
- Embedding Distance-Bounding Protocols within Intuitive InteractionsLaurent Bussard, Yves Roudier. 143-156 [doi]
- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware EnvironmentsPhilip Robinson, Michael Beigl. 157-172 [doi]
- Time Constraint Delegation for P2P Data DecryptionTieyan Li. 173-186 [doi]
- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive ComputingKemal Bicakci, Nazife Baykal. 187-200 [doi]
- Security and Privacy Aspects of Low-Cost Radio Frequency Identification SystemsStephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels. 201-212 [doi]
- Implementing a Formally Verifiable Security Protocol in Java CardEngelbert Hubbers, Martijn Oostdijk, Erik Poll. 213-226 [doi]
- Cellular Automata Based Multiplier for Public-Key CryptosystemHyun-Sung Kim, Kee-Young Yoo. 227-236 [doi]
- Enlisting Hardware Architecture to Thwart Malicious Code InjectionRuby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi. 237-252 [doi]
- Optimized RISC Architecture for Multiple-Precision Modular ArithmeticJohann Großschädl, Guy-Armand Kamendje. 253-270 [doi]
- Visual Crypto Displays Enabling Secure CommunicationsPim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk. 271-284 [doi]
- Security and Privacy in Pervasive Computing State of the Art and Future DirectionsDieter Hutter, Werner Stephan, Markus Ullmann. 285-289 [doi]