Buch, Englisch, 243 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 820 g
Reihe: Security and Cryptology
Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
Buch, Englisch, 243 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 820 g
Reihe: Security and Cryptology
ISBN: 978-3-540-33376-0
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Informationsvisualisierung
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering Objektorientierte Softwareentwicklung
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
Weitere Infos & Material
Invited Talk.- Trust Without Identification.- Protocols.- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.- Enabling Secure Discovery in a Pervasive Environment.- Forward Secure Communication in Wireless Sensor Networks.- Mechanisms.- Low Rate DoS Attack to Monoprocess Servers.- Delegating Secure Logging in Pervasive Computing Systems.- Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.- Integrity.- Higher Dependability and Security for Mobile Applications.- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.- Privacy and Security.- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues.- Profiles and Context Awareness for Mobile Users – A Middleware Approach Supporting Personal Security.- Privacy Sensitive Location Information Systems in Smart Buildings.- Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation.- Information Flow and Access Control.- Securing Information Gateways with Derivation-Constrained Access Control.- Information Flow Control to Secure Dynamic Web Service Composition.- Authentication.- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.- Attribute-Based Authentication Model for Dynamic Mobile Environments.