Security in Pervasive Computing

Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings

  • Dieter Hutter
  • Markus Ullmann
Conference proceedings SPC 2005

DOI: 10.1007/b135497

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3450)

Table of contents (22 papers)

  1. Front Matter
  2. Invited Talk (Abstract)

  3. Session 1: Smart Devices and Applications

    1. TENeT: A Framework for Distributed Smartcards
      Masayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka et al.
      Pages 3-17
    2. P2P Digital Value Fair Trading System Using Smart Cards
      Masayuki Hanadate, Masayuki Terada, Shinji Nagao, Toshiyuki Miyazawa, Yukiko Yosuke, Seiji Tomita et al.
      Pages 18-30
  4. Invited Talk (Abstract)

    1. Securing Ad Hoc Networks
      Panos Papadimitratos
      Pages 46-47
  5. Session 2: Short Paper Session

    1. Secure Identity Management for Pseudo-Anonymous Service Access
      Michael Hitchens, Judy Kay, Bob Kummerfeld, Ajay Brar
      Pages 48-55
    2. Security Issues for Pervasive Personalized Communication Systems
      Bertin Klein, Tristan Miller, Sandra Zilles
      Pages 56-62
    3. Safeguards in a World of Ambient Intelligence
      Michael Friedewald
      Pages 63-69
  6. Session 3: Authentication (I)

    1. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
      Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won
      Pages 70-84
  7. Invited Talk (Abstract)

    1. Security Concept of the EU-Passport
      Dennis Kügler
      Pages 85-85
  8. Session 4: Authentication (II)

  9. Invited Talk (Abstract)

    1. EPC Technology
      Christian Floerkemeier, Frederic Thiesse
      Pages 117-118
  10. Session 5: Authentication (III)

    1. Exploiting Empirical Engagement in Authentication Protocol Design
      Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin
      Pages 119-133
    2. Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
      Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell
      Pages 134-150
    3. Look Who’s Talking – Authenticating Service Access Points
      Adolf Hohl, Lutz Lowis, Alf Zugenmaier
      Pages 151-162
  11. Invited Talk (Abstract)

    1. Security Issues of Mobile Devices
      Claudia Eckert
      Pages 163-163
  12. Session 6: Privacy and Anonymity

    1. Privacy for Profitable Location Based Services
      Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
      Pages 164-178
    2. On the Anonymity of Periodic Location Samples
      Marco Gruteser, Baik Hoh
      Pages 179-192

About these proceedings


Ambient Intelligence IT security Smart Card communications security cryptographic protocols data security handhelds healthcare identity internet security mobile computing security smart cards trust web security

Editors and affiliations

  • Dieter Hutter
    • 1
  • Markus Ullmann
    • 2
  1. 1.DFKISaarbrückenGermany
  2. 2.Federal Office for Information Security (BSI)BonnGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-25521-5
  • Online ISBN 978-3-540-32004-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349