Normal view MARC view ISBD view

Security in Pervasive Computing : First International Conference, Boppard, Germany, March 12-14, 2003 : Revised Papers

By: Hutter, Dieter.
Contributor(s): Muller, Gunter | Stephan, Werner | Ullmann, Markus.
Material type: materialTypeLabelBookSeries: 2802. Lecture notes in computer science.Publisher: Berlin: Springer, 2004Description: xi, 289 p.; ill., index: 24 cm.ISBN: 3540208879 .Subject(s): Computer security | Hardware architectures | Hotspot Networks | Wireless | End-to-End Trust Starts | Server Assisted Signature Scheme for Pervasive Computing (SAOTS0 | Visual Crypto Displays | Multiple-Precision Modular Arithmetic | Pervasive Computing | Security policies and protection | Ubiquitous computingDDC classification: 004 Summary: This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003. The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefully selected during two rounds of reviewing and improvements. The papers are organized in topical sections on location privacy, security requirements, security policies and protection, authentication and trust, secure infrastructures, smart labels, verifications, and hardware architectures
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Books 004 HUT (Browse shelf) Available 009659

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003. The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefully selected during two rounds of reviewing and improvements. The papers are organized in topical sections on location privacy, security requirements, security policies and protection, authentication and trust, secure infrastructures, smart labels, verifications, and hardware architectures

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha