Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/spc/spc2003.bht:"
@proceedings{DBLP:conf/spc/2003, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95124}, doi = {10.1007/B95124}, isbn = {3-540-20887-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BicakciB03, author = {Kemal Bicakci and Nazife Baykal}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {{SAOTS:} {A} New Efficient Server Assisted Signature Scheme for Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {187--200}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_17}, doi = {10.1007/978-3-540-39881-3\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/BicakciB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BohnGV03, author = {J{\"{u}}rgen Bohn and Felix C. G{\"{a}}rtner and Harald Vogt}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Dependability Issues of Pervasive Computing in a Healthcare Environment}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {53--70}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_8}, doi = {10.1007/978-3-540-39881-3\_8}, timestamp = {Wed, 27 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/BohnGV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BussardR03, author = {Laurent Bussard and Yves Roudier}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Embedding Distance-Bounding Protocols within Intuitive Interactions}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {143--156}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_14}, doi = {10.1007/978-3-540-39881-3\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/BussardR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/ChiversCS03, author = {Howard Chivers and John A. Clark and Susan Stepney}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Smart Devices and Software Agents: The Basics of Good Behaviour}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {39--52}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_7}, doi = {10.1007/978-3-540-39881-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/ChiversCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/CreeseGRZ03, author = {Sadie Creese and Michael Goldsmith and Bill Roscoe and Irfan Zakiuddin}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Authentication for Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {116--129}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_12}, doi = {10.1007/978-3-540-39881-3\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/CreeseGRZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/GorlaP03, author = {Daniele Gorla and Rosario Pugliese}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Enforcing Security Policies via Types}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {86--100}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_10}, doi = {10.1007/978-3-540-39881-3\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/GorlaP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/GrossschadlK03, author = {Johann Gro{\ss}sch{\"{a}}dl and Guy{-}Armand Kamendje}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Optimized {RISC} Architecture for Multiple-Precision Modular Arithmetic}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {253--270}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_22}, doi = {10.1007/978-3-540-39881-3\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/GrossschadlK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/GruteserG03, author = {Marco Gruteser and Dirk Grunwald}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {10--24}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_5}, doi = {10.1007/978-3-540-39881-3\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/GruteserG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HengartnerS03, author = {Urs Hengartner and Peter Steenkiste}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Protecting Access to People Location Information}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {25--38}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_6}, doi = {10.1007/978-3-540-39881-3\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HengartnerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HubbersOP03, author = {Engelbert Hubbers and Martijn Oostdijk and Erik Poll}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Implementing a Formally Verifiable Security Protocol in Java Card}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {213--226}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_19}, doi = {10.1007/978-3-540-39881-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HubbersOP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HutterSU03, author = {Dieter Hutter and Werner Stephan and Markus Ullmann}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security and Privacy in Pervasive Computing State of the Art and Future Directions}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {285--289}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_24}, doi = {10.1007/978-3-540-39881-3\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HutterSU03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Karger03, author = {Paul A. Karger}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {The Importance of High Assurance Security in Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {9}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_4}, doi = {10.1007/978-3-540-39881-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Karger03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/KimY03, author = {Hyun{-}Sung Kim and Kee{-}Young Yoo}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Cellular Automata Based Multiplier for Public-Key Cryptosystem}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {227--236}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_20}, doi = {10.1007/978-3-540-39881-3\_20}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/KimY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/KvarnstromHJ03, author = {H{\aa}kan Kvarnstr{\"{o}}m and Hans Hedbom and Erland Jonsson}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Protecting Security Policies in Ubiquitous Environments Using One-Way Functions}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {71--85}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_9}, doi = {10.1007/978-3-540-39881-3\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/KvarnstromHJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/LeeKMS03, author = {Ruby B. Lee and David K. Karig and John Patrick McGregor and Zhijie Shi}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Enlisting Hardware Architecture to Thwart Malicious Code Injection}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {237--252}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_21}, doi = {10.1007/978-3-540-39881-3\_21}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/LeeKMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Li03, author = {Tieyan Li}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Time Constraint Delegation for {P2P} Data Decryption}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {173--186}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_16}, doi = {10.1007/978-3-540-39881-3\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Li03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Mattern03, author = {Friedemann Mattern}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {The Age of Pervasive Computing? Everything Smart, Everything Connected?}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {1}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_1}, doi = {10.1007/978-3-540-39881-3\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Mattern03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Nakashima03, author = {Hideyuki Nakashima}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Cyber Assist Project and Its Security Requirement}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {2--5}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_2}, doi = {10.1007/978-3-540-39881-3\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Nakashima03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/RobinsonB03, author = {Philip Robinson and Michael Beigl}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {157--172}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_15}, doi = {10.1007/978-3-540-39881-3\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/RobinsonB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Schairer03, author = {Axel Schairer}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {101--115}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_11}, doi = {10.1007/978-3-540-39881-3\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Schairer03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/SeigneurFJGC03, author = {Jean{-}Marc Seigneur and Stephen Farrell and Christian Damsgaard Jensen and Elizabeth Gray and Yong Chen}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {End-to-End Trust Starts with Recognition}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {130--142}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_13}, doi = {10.1007/978-3-540-39881-3\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/SeigneurFJGC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Stajano03, author = {Frank Stajano}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security in Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {6--8}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_3}, doi = {10.1007/978-3-540-39881-3\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Stajano03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/TuylsKSSD03, author = {Pim Tuyls and Tom A. M. Kevenaar and Geert Jan Schrijen and Toine Staring and Marten van Dijk}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Visual Crypto Displays Enabling Secure Communications}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {271--284}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_23}, doi = {10.1007/978-3-540-39881-3\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/TuylsKSSD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/WeisSRE03, author = {Stephen A. Weis and Sanjay E. Sarma and Ronald L. Rivest and Daniel W. Engels}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {201--212}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_18}, doi = {10.1007/978-3-540-39881-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/WeisSRE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.