default search action
Search dblp for Publications
export results for "stream:streams/conf/spc:"
@inproceedings{DBLP:conf/spc/AccorsiH06, author = {Rafael Accorsi and Adolf Hohl}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Delegating Secure Logging in Pervasive Computing Systems}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {58--72}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_6}, doi = {10.1007/11734666\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/AccorsiH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BecherBD06, author = {Alexander Becher and Zinaida Benenson and Maximillian Dornseif}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {104--118}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_9}, doi = {10.1007/11734666\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/BecherBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BoyerTG06, author = {Jodie P. Boyer and Kaijun Tan and Carl A. Gunter}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Privacy Sensitive Location Information Systems in Smart Buildings}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {149--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_12}, doi = {10.1007/11734666\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/BoyerTG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/ByunLLH06, author = {Jin Wook Byun and Su{-}Mi Lee and Dong Hoon Lee and Dowon Hong}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {3--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_2}, doi = {10.1007/11734666\_2}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/ByunLLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Chivers06, author = {Howard Chivers}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Trust Without Identification}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {1--2}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_1}, doi = {10.1007/11734666\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Chivers06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/CovingtonSM06, author = {Michael J. Covington and Manoj R. Sastry and Deepak J. Manohar}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Attribute-Based Authentication Model for Dynamic Mobile Environments}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {227--242}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_17}, doi = {10.1007/11734666\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/CovingtonSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/EichlerW06, author = {Gerald Eichler and Matthias O. Will}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Profiles and Context Awareness for Mobile Users - {A} Middleware Approach Supporting Personal Security}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {134--148}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_11}, doi = {10.1007/11734666\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/EichlerW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/FriedewaldVPW06, author = {Michael Friedewald and Elena Vildjiounaite and Yves Punie and David Wright}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {119--133}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_10}, doi = {10.1007/11734666\_10}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/FriedewaldVPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HengartnerS06, author = {Urs Hengartner and Peter Steenkiste}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Securing Information Gateways with Derivation-Constrained Access Control}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {181--195}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_14}, doi = {10.1007/11734666\_14}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HengartnerS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HuangYMS06, author = {Leping Huang and Hiroshi Yamane and Kanta Matsuura and Kaoru Sezaki}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {165--180}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_13}, doi = {10.1007/11734666\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HuangYMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HutterV06, author = {Dieter Hutter and Melanie Volkamer}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Information Flow Control to Secure Dynamic Web Service Composition}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {196--210}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_15}, doi = {10.1007/11734666\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HutterV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Jin06, author = {Hongxia Jin}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Higher Dependability and Security for Mobile Applications}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {89--103}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_8}, doi = {10.1007/11734666\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Jin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Macia-FernandezDG06, author = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Pedro Garcia{-}Teodoro}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Low Rate DoS Attack to Monoprocess Servers}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {43--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_5}, doi = {10.1007/11734666\_5}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Macia-FernandezDG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/MauwVB06, author = {Sjouke Mauw and Ivo van Vessem and Bert Bos}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Forward Secure Communication in Wireless Sensor Networks}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {32--42}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_4}, doi = {10.1007/11734666\_4}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/MauwVB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/ShaikhD06, author = {Siraj A. Shaikh and Christos K. Dimitriadis}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using {CSP} and Rank Functions}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {211--226}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_16}, doi = {10.1007/11734666\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/ShaikhD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/TrabelsiPR06, author = {Slim Trabelsi and Jean{-}Christophe R. Pazzaglia and Yves Roudier}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Enabling Secure Discovery in a Pervasive Environment}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {18--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_3}, doi = {10.1007/11734666\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/TrabelsiPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/YangCCC06, author = {Bo{-}Yin Yang and Chen{-}Mou Cheng and Bor{-}rong Chen and Jiun{-}Ming Chen}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Implementing Minimized Multivariate {PKC} on Low-Resource Embedded Systems}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {73--88}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_7}, doi = {10.1007/11734666\_7}, timestamp = {Mon, 14 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/YangCCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spc/2006, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666}, doi = {10.1007/11734666}, isbn = {3-540-33376-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/AlmenarezMCG05, author = {Florina Almen{\'{a}}rez and Andr{\'{e}}s Mar{\'{\i}}n L{\'{o}}pez and Celeste Campo and R. Carlos Garc{\'{\i}}a}, editor = {Dieter Hutter and Markus Ullmann}, title = {TrustAC: Trust-Based Access Control for Pervasive Devices}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {225--238}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11414360\_22}, doi = {10.1007/11414360\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/AlmenarezMCG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/CreeseGHRWZ05, author = {Sadie Creese and Michael Goldsmith and Richard Harrison and Bill Roscoe and Paul Whittaker and Irfan Zakiuddin}, editor = {Dieter Hutter and Markus Ullmann}, title = {Exploiting Empirical Engagement in Authentication Protocol Design}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {119--133}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_14}, doi = {10.1007/978-3-540-32004-3\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/CreeseGHRWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/DarvasHS05, author = {{\'{A}}d{\'{a}}m Darvas and Reiner H{\"{a}}hnle and David Sands}, editor = {Dieter Hutter and Markus Ullmann}, title = {A Theorem Proving Approach to Analysis of Secure Information Flow}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {193--209}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_20}, doi = {10.1007/978-3-540-32004-3\_20}, timestamp = {Sun, 14 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/DarvasHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Eckert05, author = {Claudia Eckert}, editor = {Dieter Hutter and Markus Ullmann}, title = {Security Issues of Mobile Devices}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_17}, doi = {10.1007/978-3-540-32004-3\_17}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/Eckert05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/FloerkemeierT05, author = {Christian Floerkemeier and Fr{\'{e}}d{\'{e}}ric Thiesse}, editor = {Dieter Hutter and Markus Ullmann}, title = {{EPC} Technology}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {117--118}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_13}, doi = {10.1007/978-3-540-32004-3\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/FloerkemeierT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Friedewald05, author = {Michael Friedewald}, editor = {Dieter Hutter and Markus Ullmann}, title = {Safeguards in a World of Ambient Intelligence}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {63--69}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_8}, doi = {10.1007/978-3-540-32004-3\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Friedewald05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/GruteserH05, author = {Marco Gruteser and Baik Hoh}, editor = {Dieter Hutter and Markus Ullmann}, title = {On the Anonymity of Periodic Location Samples}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {179--192}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_19}, doi = {10.1007/978-3-540-32004-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/GruteserH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HanadateTNMYTF05, author = {Masayuki Hanadate and Masayuki Terada and Shinji Nagao and Toshiyuki Miyazawa and Yukiko Yosuke and Seiji Tomita and Ko Fujimura}, editor = {Dieter Hutter and Markus Ullmann}, title = {{P2P} Digital Value Fair Trading System Using Smart Cards}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {18--30}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_3}, doi = {10.1007/978-3-540-32004-3\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HanadateTNMYTF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Hilty05, author = {Lorenz M. Hilty}, editor = {Dieter Hutter and Markus Ullmann}, title = {Pervasive Computing - {A} Case for the Precautionary Principle?}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {1--2}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_1}, doi = {10.1007/978-3-540-32004-3\_1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Hilty05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HitchensKKB05, author = {Michael Hitchens and Judy Kay and Bob Kummerfeld and Ajay Brar}, editor = {Dieter Hutter and Markus Ullmann}, title = {Secure Identity Management for Pseudo-Anonymous Service Access}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {48--55}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_6}, doi = {10.1007/978-3-540-32004-3\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/HitchensKKB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Hoepman05, author = {Jaap{-}Henk Hoepman}, editor = {Dieter Hutter and Markus Ullmann}, title = {Ephemeral Pairing on Anonymous Networks}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {101--116}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_12}, doi = {10.1007/978-3-540-32004-3\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Hoepman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HohlLZ05, author = {Adolf Hohl and Lutz Lowis and Alf Zugenmaier}, editor = {Dieter Hutter and Markus Ullmann}, title = {Look Who's Talking - Authenticating Service Access Points}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {151--162}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_16}, doi = {10.1007/978-3-540-32004-3\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HohlLZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/KeohL05, author = {Sye Loong Keoh and Emil Lupu}, editor = {Dieter Hutter and Markus Ullmann}, title = {An Efficient Access Control Model for Mobile Ad-Hoc Communities}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {210--224}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_21}, doi = {10.1007/978-3-540-32004-3\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/KeohL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/KleinMZ05, author = {Bertin Klein and Tristan Miller and Sandra Zilles}, editor = {Dieter Hutter and Markus Ullmann}, title = {Security Issues for Pervasive Personalized Communication Systems}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {56--62}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_7}, doi = {10.1007/978-3-540-32004-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/KleinMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/KolschFKK05, author = {Tobias K{\"{o}}lsch and Lothar Fritsch and Markulf Kohlweiss and Dogan Kesdogan}, editor = {Dieter Hutter and Markus Ullmann}, title = {Privacy for Profitable Location Based Services}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {164--178}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_18}, doi = {10.1007/978-3-540-32004-3\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/KolschFKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Kugler05, author = {Dennis K{\"{u}}gler}, editor = {Dieter Hutter and Markus Ullmann}, title = {Security Concept of the EU-Passport}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {85}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_10}, doi = {10.1007/978-3-540-32004-3\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Kugler05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/LeeBDNHC05, author = {Adam J. Lee and Jodie P. Boyer and Chris Drexelius and Prasad Naldurg and Raquel L. Hill and Roy H. Campbell}, editor = {Dieter Hutter and Markus Ullmann}, title = {Supporting Dynamically Changing Authorizations in Pervasive Communication Systems}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {134--150}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_15}, doi = {10.1007/978-3-540-32004-3\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/LeeBDNHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/LiuCS05, author = {Yang Liu and John A. Clark and Susan Stepney}, editor = {Dieter Hutter and Markus Ullmann}, title = {"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: {A} Ubiquitous Healthcare Example}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {31--45}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_4}, doi = {10.1007/978-3-540-32004-3\_4}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/LiuCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Papadimitratos05, author = {Panagiotis Papadimitratos}, editor = {Dieter Hutter and Markus Ullmann}, title = {Securing Ad Hoc Networks}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {46--47}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_5}, doi = {10.1007/978-3-540-32004-3\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Papadimitratos05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/RheeKKW05, author = {Keunwoo Rhee and Jin Kwak and Seungjoo Kim and Dongho Won}, editor = {Dieter Hutter and Markus Ullmann}, title = {Challenge-Response Based {RFID} Authentication Protocol for Distributed Database Environment}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {70--84}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_9}, doi = {10.1007/978-3-540-32004-3\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/RheeKKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/SeysP05, author = {Stefaan Seys and Bart Preneel}, editor = {Dieter Hutter and Markus Ullmann}, title = {Efficient Cooperative Signatures: {A} Novel Authentication Scheme for Sensor Networks}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {86--100}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_11}, doi = {10.1007/978-3-540-32004-3\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/SeysP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/TeradaMIHUKS05, author = {Masayuki Terada and Kensaku Mori and Kazuhiko Ishii and Sadayuki Hongo and Tomonori Usaka and Noboru Koshizuka and Ken Sakamura}, editor = {Dieter Hutter and Markus Ullmann}, title = {TENeT: {A} Framework for Distributed Smartcards}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {3--17}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_2}, doi = {10.1007/978-3-540-32004-3\_2}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/TeradaMIHUKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spc/2005, editor = {Dieter Hutter and Markus Ullmann}, title = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b135497}, doi = {10.1007/B135497}, isbn = {3-540-25521-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spc/2003, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95124}, doi = {10.1007/B95124}, isbn = {3-540-20887-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BicakciB03, author = {Kemal Bicakci and Nazife Baykal}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {{SAOTS:} {A} New Efficient Server Assisted Signature Scheme for Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {187--200}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_17}, doi = {10.1007/978-3-540-39881-3\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/BicakciB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BohnGV03, author = {J{\"{u}}rgen Bohn and Felix C. G{\"{a}}rtner and Harald Vogt}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Dependability Issues of Pervasive Computing in a Healthcare Environment}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {53--70}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_8}, doi = {10.1007/978-3-540-39881-3\_8}, timestamp = {Wed, 27 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/BohnGV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BussardR03, author = {Laurent Bussard and Yves Roudier}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Embedding Distance-Bounding Protocols within Intuitive Interactions}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {143--156}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_14}, doi = {10.1007/978-3-540-39881-3\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/BussardR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/ChiversCS03, author = {Howard Chivers and John A. Clark and Susan Stepney}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Smart Devices and Software Agents: The Basics of Good Behaviour}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {39--52}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_7}, doi = {10.1007/978-3-540-39881-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/ChiversCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/CreeseGRZ03, author = {Sadie Creese and Michael Goldsmith and Bill Roscoe and Irfan Zakiuddin}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Authentication for Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {116--129}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_12}, doi = {10.1007/978-3-540-39881-3\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/CreeseGRZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/GorlaP03, author = {Daniele Gorla and Rosario Pugliese}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Enforcing Security Policies via Types}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {86--100}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_10}, doi = {10.1007/978-3-540-39881-3\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/GorlaP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/GrossschadlK03, author = {Johann Gro{\ss}sch{\"{a}}dl and Guy{-}Armand Kamendje}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Optimized {RISC} Architecture for Multiple-Precision Modular Arithmetic}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {253--270}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_22}, doi = {10.1007/978-3-540-39881-3\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/GrossschadlK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/GruteserG03, author = {Marco Gruteser and Dirk Grunwald}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {10--24}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_5}, doi = {10.1007/978-3-540-39881-3\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/GruteserG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HengartnerS03, author = {Urs Hengartner and Peter Steenkiste}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Protecting Access to People Location Information}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {25--38}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_6}, doi = {10.1007/978-3-540-39881-3\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HengartnerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HubbersOP03, author = {Engelbert Hubbers and Martijn Oostdijk and Erik Poll}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Implementing a Formally Verifiable Security Protocol in Java Card}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {213--226}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_19}, doi = {10.1007/978-3-540-39881-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HubbersOP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/HutterSU03, author = {Dieter Hutter and Werner Stephan and Markus Ullmann}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security and Privacy in Pervasive Computing State of the Art and Future Directions}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {285--289}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_24}, doi = {10.1007/978-3-540-39881-3\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/HutterSU03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Karger03, author = {Paul A. Karger}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {The Importance of High Assurance Security in Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {9}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_4}, doi = {10.1007/978-3-540-39881-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Karger03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/KimY03, author = {Hyun{-}Sung Kim and Kee{-}Young Yoo}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Cellular Automata Based Multiplier for Public-Key Cryptosystem}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {227--236}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_20}, doi = {10.1007/978-3-540-39881-3\_20}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spc/KimY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/KvarnstromHJ03, author = {H{\aa}kan Kvarnstr{\"{o}}m and Hans Hedbom and Erland Jonsson}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Protecting Security Policies in Ubiquitous Environments Using One-Way Functions}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {71--85}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_9}, doi = {10.1007/978-3-540-39881-3\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/KvarnstromHJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/LeeKMS03, author = {Ruby B. Lee and David K. Karig and John Patrick McGregor and Zhijie Shi}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Enlisting Hardware Architecture to Thwart Malicious Code Injection}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {237--252}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_21}, doi = {10.1007/978-3-540-39881-3\_21}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/LeeKMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Li03, author = {Tieyan Li}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Time Constraint Delegation for {P2P} Data Decryption}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {173--186}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_16}, doi = {10.1007/978-3-540-39881-3\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Li03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Mattern03, author = {Friedemann Mattern}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {The Age of Pervasive Computing? Everything Smart, Everything Connected?}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {1}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_1}, doi = {10.1007/978-3-540-39881-3\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Mattern03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Nakashima03, author = {Hideyuki Nakashima}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Cyber Assist Project and Its Security Requirement}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {2--5}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_2}, doi = {10.1007/978-3-540-39881-3\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Nakashima03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/RobinsonB03, author = {Philip Robinson and Michael Beigl}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {157--172}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_15}, doi = {10.1007/978-3-540-39881-3\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/RobinsonB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Schairer03, author = {Axel Schairer}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {101--115}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_11}, doi = {10.1007/978-3-540-39881-3\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Schairer03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/SeigneurFJGC03, author = {Jean{-}Marc Seigneur and Stephen Farrell and Christian Damsgaard Jensen and Elizabeth Gray and Yong Chen}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {End-to-End Trust Starts with Recognition}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {130--142}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_13}, doi = {10.1007/978-3-540-39881-3\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/SeigneurFJGC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Stajano03, author = {Frank Stajano}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security in Pervasive Computing}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {6--8}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_3}, doi = {10.1007/978-3-540-39881-3\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/Stajano03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/TuylsKSSD03, author = {Pim Tuyls and Tom A. M. Kevenaar and Geert Jan Schrijen and Toine Staring and Marten van Dijk}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Visual Crypto Displays Enabling Secure Communications}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {271--284}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_23}, doi = {10.1007/978-3-540-39881-3\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/TuylsKSSD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/WeisSRE03, author = {Stephen A. Weis and Sanjay E. Sarma and Ronald L. Rivest and Daniel W. Engels}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {201--212}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_18}, doi = {10.1007/978-3-540-39881-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/WeisSRE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.