Conferences in DBLP
Friedemann Mattern The Age of Pervasive Computing? Everything Smart, Everything Connected? [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:1- [Conf ] Hideyuki Nakashima Cyber Assist Project and Its Security Requirement. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:2-5 [Conf ] Frank Stajano Security in Pervasive Computing. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:6-8 [Conf ] Paul A. Karger The Importance of High Assurance Security in Pervasive Computing. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:9- [Conf ] Marco Gruteser , Dirk Grunwald A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:10-24 [Conf ] Urs Hengartner , Peter Steenkiste Protecting Access to People Location Information. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:25-38 [Conf ] Howard Chivers , John A. Clark , Susan Stepney Smart Devices and Software Agents: The Basics of Good Behaviour. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:39-52 [Conf ] Jürgen Bohn , Felix C. Gärtner , Harald Vogt Dependability Issues of Pervasive Computing in a Healthcare Environment. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:53-70 [Conf ] Håkan Kvarnström , Hans Hedbom , Erland Jonsson Protecting Security Policies in Ubiquitous Environments Using One-Way Functions. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:71-85 [Conf ] Daniele Gorla , Rosario Pugliese Enforcing Security Policies via Types. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:86-100 [Conf ] Axel Schairer Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:101-115 [Conf ] Sadie Creese , Michael Goldsmith , Bill Roscoe , Irfan Zakiuddin Authentication for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:116-129 [Conf ] Jean-Marc Seigneur , Stephen Farrell , Christian Damsgaard Jensen , Elizabeth Gray , Yong Chen End-to-End Trust Starts with Recognition. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:130-142 [Conf ] Laurent Bussard , Yves Roudier Embedding Distance-Bounding Protocols within Intuitive Interactions. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:143-156 [Conf ] Philip Robinson , Michael Beigl Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:157-172 [Conf ] Tie-Yan Li Time Constraint Delegation for P2P Data Decryption. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:173-186 [Conf ] Kemal Bicakci , Nazife Baykal SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:187-200 [Conf ] Stephen A. Weis , Sanjay E. Sarma , Ronald L. Rivest , Daniel W. Engels Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:201-212 [Conf ] Engelbert Hubbers , Martijn Oostdijk , Erik Poll Implementing a Formally Verifiable Security Protocol in Java Card. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:213-226 [Conf ] Hyun-Sung Kim , Kee-Young Yoo Cellular Automata Based Multiplier for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:227-236 [Conf ] Ruby B. Lee , David K. Karig , John Patrick McGregor , Zhijie Shi Enlisting Hardware Architecture to Thwart Malicious Code Injection. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:237-252 [Conf ] Johann Großschädl , Guy-Armand Kamendje Optimized RISC Architecture for Multiple-Precision Modular Arithmetic. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:253-270 [Conf ] Pim Tuyls , Tom A. M. Kevenaar , Geert Jan Schrijen , Toine Staring , Marten van Dijk Visual Crypto Displays Enabling Secure Communications. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:271-284 [Conf ] Dieter Hutter , Werner Stephan , Markus Ullmann Security and Privacy in Pervasive Computing State of the Art and Future Directions. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:285-289 [Conf ]