Search dblp for Publications

export results for "stream:streams/conf/spc:"

 download as .bib file

@inproceedings{DBLP:conf/spc/AccorsiH06,
  author       = {Rafael Accorsi and
                  Adolf Hohl},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Delegating Secure Logging in Pervasive Computing Systems},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_6},
  doi          = {10.1007/11734666\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/AccorsiH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BecherBD06,
  author       = {Alexander Becher and
                  Zinaida Benenson and
                  Maximillian Dornseif},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Tampering with Motes: Real-World Physical Attacks on Wireless Sensor
                  Networks},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_9},
  doi          = {10.1007/11734666\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/BecherBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BoyerTG06,
  author       = {Jodie P. Boyer and
                  Kaijun Tan and
                  Carl A. Gunter},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Privacy Sensitive Location Information Systems in Smart Buildings},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {149--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_12},
  doi          = {10.1007/11734666\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/BoyerTG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/ByunLLH06,
  author       = {Jin Wook Byun and
                  Su{-}Mi Lee and
                  Dong Hoon Lee and
                  Dowon Hong},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Constant-Round Password-Based Group Key Generation for Multi-layer
                  Ad-Hoc Networks},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_2},
  doi          = {10.1007/11734666\_2},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/ByunLLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Chivers06,
  author       = {Howard Chivers},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Trust Without Identification},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_1},
  doi          = {10.1007/11734666\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Chivers06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/CovingtonSM06,
  author       = {Michael J. Covington and
                  Manoj R. Sastry and
                  Deepak J. Manohar},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Attribute-Based Authentication Model for Dynamic Mobile Environments},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_17},
  doi          = {10.1007/11734666\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/CovingtonSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/EichlerW06,
  author       = {Gerald Eichler and
                  Matthias O. Will},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Profiles and Context Awareness for Mobile Users - {A} Middleware Approach
                  Supporting Personal Security},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_11},
  doi          = {10.1007/11734666\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/EichlerW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/FriedewaldVPW06,
  author       = {Michael Friedewald and
                  Elena Vildjiounaite and
                  Yves Punie and
                  David Wright},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {The Brave New World of Ambient Intelligence: An Analysis of Scenarios
                  Regarding Privacy, Identity and Security Issues},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_10},
  doi          = {10.1007/11734666\_10},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/FriedewaldVPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HengartnerS06,
  author       = {Urs Hengartner and
                  Peter Steenkiste},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Securing Information Gateways with Derivation-Constrained Access Control},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_14},
  doi          = {10.1007/11734666\_14},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HengartnerS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HuangYMS06,
  author       = {Leping Huang and
                  Hiroshi Yamane and
                  Kanta Matsuura and
                  Kaoru Sezaki},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Silent Cascade: Enhancing Location Privacy Without Communication QoS
                  Degradation},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_13},
  doi          = {10.1007/11734666\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HuangYMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HutterV06,
  author       = {Dieter Hutter and
                  Melanie Volkamer},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Information Flow Control to Secure Dynamic Web Service Composition},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_15},
  doi          = {10.1007/11734666\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HutterV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Jin06,
  author       = {Hongxia Jin},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Higher Dependability and Security for Mobile Applications},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_8},
  doi          = {10.1007/11734666\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Jin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Macia-FernandezDG06,
  author       = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and
                  Pedro Garcia{-}Teodoro},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Low Rate DoS Attack to Monoprocess Servers},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {43--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_5},
  doi          = {10.1007/11734666\_5},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Macia-FernandezDG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/MauwVB06,
  author       = {Sjouke Mauw and
                  Ivo van Vessem and
                  Bert Bos},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Forward Secure Communication in Wireless Sensor Networks},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {32--42},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_4},
  doi          = {10.1007/11734666\_4},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/MauwVB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/ShaikhD06,
  author       = {Siraj A. Shaikh and
                  Christos K. Dimitriadis},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Analysing a Biometric Authentication Protocol for 3G Mobile Systems
                  Using {CSP} and Rank Functions},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_16},
  doi          = {10.1007/11734666\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/ShaikhD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/TrabelsiPR06,
  author       = {Slim Trabelsi and
                  Jean{-}Christophe R. Pazzaglia and
                  Yves Roudier},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Enabling Secure Discovery in a Pervasive Environment},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_3},
  doi          = {10.1007/11734666\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/TrabelsiPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/YangCCC06,
  author       = {Bo{-}Yin Yang and
                  Chen{-}Mou Cheng and
                  Bor{-}rong Chen and
                  Jiun{-}Ming Chen},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Implementing Minimized Multivariate {PKC} on Low-Resource Embedded
                  Systems},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_7},
  doi          = {10.1007/11734666\_7},
  timestamp    = {Mon, 14 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/YangCCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spc/2006,
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666},
  doi          = {10.1007/11734666},
  isbn         = {3-540-33376-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/AlmenarezMCG05,
  author       = {Florina Almen{\'{a}}rez and
                  Andr{\'{e}}s Mar{\'{\i}}n L{\'{o}}pez and
                  Celeste Campo and
                  R. Carlos Garc{\'{\i}}a},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {TrustAC: Trust-Based Access Control for Pervasive Devices},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {225--238},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11414360\_22},
  doi          = {10.1007/11414360\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/AlmenarezMCG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/CreeseGHRWZ05,
  author       = {Sadie Creese and
                  Michael Goldsmith and
                  Richard Harrison and
                  Bill Roscoe and
                  Paul Whittaker and
                  Irfan Zakiuddin},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Exploiting Empirical Engagement in Authentication Protocol Design},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_14},
  doi          = {10.1007/978-3-540-32004-3\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/CreeseGHRWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/DarvasHS05,
  author       = {{\'{A}}d{\'{a}}m Darvas and
                  Reiner H{\"{a}}hnle and
                  David Sands},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {A Theorem Proving Approach to Analysis of Secure Information Flow},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {193--209},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_20},
  doi          = {10.1007/978-3-540-32004-3\_20},
  timestamp    = {Sun, 14 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/DarvasHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Eckert05,
  author       = {Claudia Eckert},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Security Issues of Mobile Devices},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {163},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_17},
  doi          = {10.1007/978-3-540-32004-3\_17},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/Eckert05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/FloerkemeierT05,
  author       = {Christian Floerkemeier and
                  Fr{\'{e}}d{\'{e}}ric Thiesse},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {{EPC} Technology},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {117--118},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_13},
  doi          = {10.1007/978-3-540-32004-3\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/FloerkemeierT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Friedewald05,
  author       = {Michael Friedewald},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Safeguards in a World of Ambient Intelligence},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {63--69},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_8},
  doi          = {10.1007/978-3-540-32004-3\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Friedewald05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/GruteserH05,
  author       = {Marco Gruteser and
                  Baik Hoh},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {On the Anonymity of Periodic Location Samples},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {179--192},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_19},
  doi          = {10.1007/978-3-540-32004-3\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/GruteserH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HanadateTNMYTF05,
  author       = {Masayuki Hanadate and
                  Masayuki Terada and
                  Shinji Nagao and
                  Toshiyuki Miyazawa and
                  Yukiko Yosuke and
                  Seiji Tomita and
                  Ko Fujimura},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {{P2P} Digital Value Fair Trading System Using Smart Cards},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_3},
  doi          = {10.1007/978-3-540-32004-3\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HanadateTNMYTF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Hilty05,
  author       = {Lorenz M. Hilty},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Pervasive Computing - {A} Case for the Precautionary Principle?},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_1},
  doi          = {10.1007/978-3-540-32004-3\_1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Hilty05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HitchensKKB05,
  author       = {Michael Hitchens and
                  Judy Kay and
                  Bob Kummerfeld and
                  Ajay Brar},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Secure Identity Management for Pseudo-Anonymous Service Access},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {48--55},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_6},
  doi          = {10.1007/978-3-540-32004-3\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/HitchensKKB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Hoepman05,
  author       = {Jaap{-}Henk Hoepman},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Ephemeral Pairing on Anonymous Networks},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_12},
  doi          = {10.1007/978-3-540-32004-3\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Hoepman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HohlLZ05,
  author       = {Adolf Hohl and
                  Lutz Lowis and
                  Alf Zugenmaier},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Look Who's Talking - Authenticating Service Access Points},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_16},
  doi          = {10.1007/978-3-540-32004-3\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HohlLZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/KeohL05,
  author       = {Sye Loong Keoh and
                  Emil Lupu},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {An Efficient Access Control Model for Mobile Ad-Hoc Communities},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {210--224},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_21},
  doi          = {10.1007/978-3-540-32004-3\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/KeohL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/KleinMZ05,
  author       = {Bertin Klein and
                  Tristan Miller and
                  Sandra Zilles},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Security Issues for Pervasive Personalized Communication Systems},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {56--62},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_7},
  doi          = {10.1007/978-3-540-32004-3\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/KleinMZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/KolschFKK05,
  author       = {Tobias K{\"{o}}lsch and
                  Lothar Fritsch and
                  Markulf Kohlweiss and
                  Dogan Kesdogan},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Privacy for Profitable Location Based Services},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_18},
  doi          = {10.1007/978-3-540-32004-3\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/KolschFKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Kugler05,
  author       = {Dennis K{\"{u}}gler},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Security Concept of the EU-Passport},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {85},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_10},
  doi          = {10.1007/978-3-540-32004-3\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Kugler05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/LeeBDNHC05,
  author       = {Adam J. Lee and
                  Jodie P. Boyer and
                  Chris Drexelius and
                  Prasad Naldurg and
                  Raquel L. Hill and
                  Roy H. Campbell},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Supporting Dynamically Changing Authorizations in Pervasive Communication
                  Systems},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {134--150},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_15},
  doi          = {10.1007/978-3-540-32004-3\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/LeeBDNHC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/LiuCS05,
  author       = {Yang Liu and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {"Devices Are People Too" Using Process Patterns to Elicit Security
                  Requirements in Novel Domains: {A} Ubiquitous Healthcare Example},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_4},
  doi          = {10.1007/978-3-540-32004-3\_4},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/LiuCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Papadimitratos05,
  author       = {Panagiotis Papadimitratos},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Securing Ad Hoc Networks},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {46--47},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_5},
  doi          = {10.1007/978-3-540-32004-3\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Papadimitratos05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/RheeKKW05,
  author       = {Keunwoo Rhee and
                  Jin Kwak and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Challenge-Response Based {RFID} Authentication Protocol for Distributed
                  Database Environment},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {70--84},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_9},
  doi          = {10.1007/978-3-540-32004-3\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/RheeKKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/SeysP05,
  author       = {Stefaan Seys and
                  Bart Preneel},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Efficient Cooperative Signatures: {A} Novel Authentication Scheme
                  for Sensor Networks},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_11},
  doi          = {10.1007/978-3-540-32004-3\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/SeysP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/TeradaMIHUKS05,
  author       = {Masayuki Terada and
                  Kensaku Mori and
                  Kazuhiko Ishii and
                  Sadayuki Hongo and
                  Tomonori Usaka and
                  Noboru Koshizuka and
                  Ken Sakamura},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {TENeT: {A} Framework for Distributed Smartcards},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_2},
  doi          = {10.1007/978-3-540-32004-3\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/TeradaMIHUKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spc/2005,
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b135497},
  doi          = {10.1007/B135497},
  isbn         = {3-540-25521-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spc/2003,
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95124},
  doi          = {10.1007/B95124},
  isbn         = {3-540-20887-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BicakciB03,
  author       = {Kemal Bicakci and
                  Nazife Baykal},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {{SAOTS:} {A} New Efficient Server Assisted Signature Scheme for Pervasive
                  Computing},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_17},
  doi          = {10.1007/978-3-540-39881-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/BicakciB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BohnGV03,
  author       = {J{\"{u}}rgen Bohn and
                  Felix C. G{\"{a}}rtner and
                  Harald Vogt},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Dependability Issues of Pervasive Computing in a Healthcare Environment},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_8},
  doi          = {10.1007/978-3-540-39881-3\_8},
  timestamp    = {Wed, 27 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/BohnGV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BussardR03,
  author       = {Laurent Bussard and
                  Yves Roudier},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Embedding Distance-Bounding Protocols within Intuitive Interactions},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {143--156},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_14},
  doi          = {10.1007/978-3-540-39881-3\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/BussardR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/ChiversCS03,
  author       = {Howard Chivers and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Smart Devices and Software Agents: The Basics of Good Behaviour},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_7},
  doi          = {10.1007/978-3-540-39881-3\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/ChiversCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/CreeseGRZ03,
  author       = {Sadie Creese and
                  Michael Goldsmith and
                  Bill Roscoe and
                  Irfan Zakiuddin},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Authentication for Pervasive Computing},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_12},
  doi          = {10.1007/978-3-540-39881-3\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/CreeseGRZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/GorlaP03,
  author       = {Daniele Gorla and
                  Rosario Pugliese},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Enforcing Security Policies via Types},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_10},
  doi          = {10.1007/978-3-540-39881-3\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/GorlaP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/GrossschadlK03,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Guy{-}Armand Kamendje},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Optimized {RISC} Architecture for Multiple-Precision Modular Arithmetic},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_22},
  doi          = {10.1007/978-3-540-39881-3\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/GrossschadlK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/GruteserG03,
  author       = {Marco Gruteser and
                  Dirk Grunwald},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {A Methodological Assessment of Location Privacy Risks in Wireless
                  Hotspot Networks},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {10--24},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_5},
  doi          = {10.1007/978-3-540-39881-3\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/GruteserG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HengartnerS03,
  author       = {Urs Hengartner and
                  Peter Steenkiste},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Protecting Access to People Location Information},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {25--38},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_6},
  doi          = {10.1007/978-3-540-39881-3\_6},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HengartnerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HubbersOP03,
  author       = {Engelbert Hubbers and
                  Martijn Oostdijk and
                  Erik Poll},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Implementing a Formally Verifiable Security Protocol in Java Card},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {213--226},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_19},
  doi          = {10.1007/978-3-540-39881-3\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HubbersOP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/HutterSU03,
  author       = {Dieter Hutter and
                  Werner Stephan and
                  Markus Ullmann},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Security and Privacy in Pervasive Computing State of the Art and Future
                  Directions},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {285--289},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_24},
  doi          = {10.1007/978-3-540-39881-3\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/HutterSU03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Karger03,
  author       = {Paul A. Karger},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {The Importance of High Assurance Security in Pervasive Computing},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {9},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_4},
  doi          = {10.1007/978-3-540-39881-3\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Karger03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/KimY03,
  author       = {Hyun{-}Sung Kim and
                  Kee{-}Young Yoo},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Cellular Automata Based Multiplier for Public-Key Cryptosystem},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {227--236},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_20},
  doi          = {10.1007/978-3-540-39881-3\_20},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spc/KimY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/KvarnstromHJ03,
  author       = {H{\aa}kan Kvarnstr{\"{o}}m and
                  Hans Hedbom and
                  Erland Jonsson},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Protecting Security Policies in Ubiquitous Environments Using One-Way
                  Functions},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_9},
  doi          = {10.1007/978-3-540-39881-3\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/KvarnstromHJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/LeeKMS03,
  author       = {Ruby B. Lee and
                  David K. Karig and
                  John Patrick McGregor and
                  Zhijie Shi},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Enlisting Hardware Architecture to Thwart Malicious Code Injection},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_21},
  doi          = {10.1007/978-3-540-39881-3\_21},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/LeeKMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Li03,
  author       = {Tieyan Li},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Time Constraint Delegation for {P2P} Data Decryption},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {173--186},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_16},
  doi          = {10.1007/978-3-540-39881-3\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Li03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Mattern03,
  author       = {Friedemann Mattern},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {The Age of Pervasive Computing? Everything Smart, Everything Connected?},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {1},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_1},
  doi          = {10.1007/978-3-540-39881-3\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Mattern03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Nakashima03,
  author       = {Hideyuki Nakashima},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Cyber Assist Project and Its Security Requirement},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {2--5},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_2},
  doi          = {10.1007/978-3-540-39881-3\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Nakashima03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/RobinsonB03,
  author       = {Philip Robinson and
                  Michael Beigl},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Trust Context Spaces: An Infrastructure for Pervasive Security in
                  Context-Aware Environments},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {157--172},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_15},
  doi          = {10.1007/978-3-540-39881-3\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/RobinsonB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Schairer03,
  author       = {Axel Schairer},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Towards Using Possibilistic Information Flow Control to Design Secure
                  Multiagent Systems},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_11},
  doi          = {10.1007/978-3-540-39881-3\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Schairer03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/SeigneurFJGC03,
  author       = {Jean{-}Marc Seigneur and
                  Stephen Farrell and
                  Christian Damsgaard Jensen and
                  Elizabeth Gray and
                  Yong Chen},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {End-to-End Trust Starts with Recognition},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {130--142},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_13},
  doi          = {10.1007/978-3-540-39881-3\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/SeigneurFJGC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Stajano03,
  author       = {Frank Stajano},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Security in Pervasive Computing},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {6--8},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_3},
  doi          = {10.1007/978-3-540-39881-3\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Stajano03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/TuylsKSSD03,
  author       = {Pim Tuyls and
                  Tom A. M. Kevenaar and
                  Geert Jan Schrijen and
                  Toine Staring and
                  Marten van Dijk},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Visual Crypto Displays Enabling Secure Communications},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_23},
  doi          = {10.1007/978-3-540-39881-3\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/TuylsKSSD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/WeisSRE03,
  author       = {Stephen A. Weis and
                  Sanjay E. Sarma and
                  Ronald L. Rivest and
                  Daniel W. Engels},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Security and Privacy Aspects of Low-Cost Radio Frequency Identification
                  Systems},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_18},
  doi          = {10.1007/978-3-540-39881-3\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/WeisSRE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics