Skip to main content
  • Conference proceedings
  • © 2004

Security in Pervasive Computing

First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2802)

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

  2. Location Privacy

    1. Protecting Access to People Location Information

      • Urs Hengartner, Peter Steenkiste
      Pages 25-38
  3. Security Requirements

    1. Smart Devices and Software Agents: The Basics of Good Behaviour

      • Howard Chivers, John A. Clark, Susan Stepney
      Pages 39-52
    2. Dependability Issues of Pervasive Computing in a Healthcare Environment

      • Jürgen Bohn, Felix Gärtner, Harald Vogt
      Pages 53-70
  4. Security Policies and Protection

    1. Protecting Security Policies in Ubiquitous Environments Using One-Way Functions

      • Håkan Kvarnström, Hans Hedbom, Erland Jonsson
      Pages 71-85
    2. Enforcing Security Policies via Types

      • Daniele Gorla, Rosario Pugliese
      Pages 86-100
  5. Authentication and Trust

    1. Authentication for Pervasive Computing

      • Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin
      Pages 116-129
    2. End-to-End Trust Starts with Recognition

      • Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen
      Pages 130-142
    3. Embedding Distance-Bounding Protocols within Intuitive Interactions

      • Laurent Bussard, Yves Roudier
      Pages 143-156
  6. Smart Labels

    1. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

      • Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels
      Pages 201-212
  7. Verification

    1. Implementing a Formally Verifiable Security Protocol in Java Card

      • Engelbert Hubbers, Martijn Oostdijk, Erik Poll
      Pages 213-226

Keywords

  • Delegation
  • Information
  • Java
  • Java Card
  • Web security
  • authentication
  • handhelds
  • healthcare
  • identification
  • internet security
  • secure networking
  • security
  • trust
  • ubiquitous computing
  • wireless network security

Editors and Affiliations

  • DFKI, Saarbrücken, Germany

    Dieter Hutter

  • Institute of Computer Science and Social Studies, Department of Telematics, Albert-Ludwig University Freiburg, Germany

    Günter Müller

  • German Research Center for Artificial Intelligence, DFKI GmbH,  

    Werner Stephan

  • Federal Office for Information Security (BSI), Bonn, Germany

    Markus Ullmann

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions