Trustworthy Ubiquitous Computing

Editors:

ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online)

Table of contents (12 chapters)

  1. Front Matter

    Pages i-xix

  2. Trust and Context in UbiComp Environments

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-20

      The Automatic Trust Management of Self-Adaptive Multi-Display Environments

    3. No Access

      Book Chapter

      Pages 21-38

      Malicious Pixels Using QR Codes as Attack Vector

    4. No Access

      Book Chapter

      Pages 39-61

      A Virtual Performance Stage as a Space for Children to Create and Perform Stories

  3. Methods and Concepts to Enhance and Ensure Reliability in Ubicomp Environments

    1. Front Matter

      Pages 63-63

    2. No Access

      Book Chapter

      Pages 65-78

      Network Forensics: Detection and Mitigation of Botnet Malicious Code via Darknet

    3. No Access

      Book Chapter

      Pages 79-98

      Trusted Log Management System

    4. No Access

      Book Chapter

      Pages 99-106

      Reasoning of Collaborative Human Behaviour in Security-CriticalWork Practices: A Framework

  4. Distributed Attacks Detection and Secure Access Protocol in MANET, WSN and UbiComp Environments

    1. Front Matter

      Pages 107-107

    2. No Access

      Book Chapter

      Pages 109-147

      Mitigation of Wormhole Attack in Wireless Sensor Networks

    3. No Access

      Book Chapter

      Pages 149-173

      Protocol for Secure Access in Mobile Ad-hoc Network for Emergency Services Using Group Based Access Control Model

  5. Access Control and Mobile Payment in Trustworthy UbiComp Environment

    1. Front Matter

      Pages 175-175

    2. No Access

      Book Chapter

      Pages 177-206

      A Lightweight Graph-Based Pattern Recognition Scheme in Mobile Ad Hoc Networks

    3. No Access

      Book Chapter

      Pages 207-225

      Security Framework for Mobile Banking

    4. No Access

      Book Chapter

      Pages 227-247

      Anonymous, Secure and Fair Micropayment System to Access Location-Based Services

    5. No Access

      Book Chapter

      Pages 249-267

      Privacy Preserving with a Purpose-Based Privacy Data Graph