Abstract is missing.
- Pervasive Computing - A Case for the Precautionary Principle?Lorenz M. Hilty. 1-2 [doi]
- TENeT: A Framework for Distributed SmartcardsMasayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura. 3-17 [doi]
- P2P Digital Value Fair Trading System Using Smart CardsMasayuki Hanadate, Masayuki Terada, Shinji Nagao, Toshiyuki Miyazawa, Yukiko Yosuke, Seiji Tomita, Ko Fujimura. 18-30 [doi]
- Devices Are People Too Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare ExampleYang Liu, John A. Clark, Susan Stepney. 31-45 [doi]
- Securing Ad Hoc NetworksPanagiotis Papadimitratos. 46-47 [doi]
- Secure Identity Management for Pseudo-Anonymous Service AccessMichael Hitchens, Judy Kay, Bob Kummerfeld, Ajay Brar. 48-55 [doi]
- Security Issues for Pervasive Personalized Communication SystemsBertin Klein, Tristan Miller, Sandra Zilles. 56-62 [doi]
- Safeguards in a World of Ambient IntelligenceMichael Friedewald. 63-69 [doi]
- Challenge-Response Based RFID Authentication Protocol for Distributed Database EnvironmentKeunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won. 70-84 [doi]
- Security Concept of the EU-PassportDennis Kügler. 85 [doi]
- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor NetworksStefaan Seys, Bart Preneel. 86-100 [doi]
- Ephemeral Pairing on Anonymous NetworksJaap-Henk Hoepman. 101-116 [doi]
- EPC TechnologyChristian Floerkemeier, Frédéric Thiesse. 117-118 [doi]
- Exploiting Empirical Engagement in Authentication Protocol DesignSadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin. 119-133 [doi]
- Supporting Dynamically Changing Authorizations in Pervasive Communication SystemsAdam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell. 134-150 [doi]
- Look Who s Talking - Authenticating Service Access PointsAdolf Hohl, Lutz Lowis, Alf Zugenmaier. 151-162 [doi]
- Security Issues of Mobile DevicesClaudia Eckert. 163 [doi]
- Privacy for Profitable Location Based ServicesTobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan. 164-178 [doi]
- On the Anonymity of Periodic Location SamplesMarco Gruteser, Baik Hoh. 179-192 [doi]
- A Theorem Proving Approach to Analysis of Secure Information FlowÁdám Darvas, Reiner Hähnle, David Sands. 193-209 [doi]
- An Efficient Access Control Model for Mobile Ad-Hoc CommunitiesSye Loong Keoh, Emil Lupu. 210-224 [doi]
- TrustAC: Trust-Based Access Control for Pervasive DevicesFlorina Almenárez Mendoza, Andrés Marín López, Celeste Campo, R. Carlos García. 225-238 [doi]