The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Security in Pervasive Computing (spc)
2003 (conf/spc/2003)

  1. Friedemann Mattern
    The Age of Pervasive Computing? Everything Smart, Everything Connected? [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:1- [Conf]
  2. Hideyuki Nakashima
    Cyber Assist Project and Its Security Requirement. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:2-5 [Conf]
  3. Frank Stajano
    Security in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:6-8 [Conf]
  4. Paul A. Karger
    The Importance of High Assurance Security in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:9- [Conf]
  5. Marco Gruteser, Dirk Grunwald
    A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:10-24 [Conf]
  6. Urs Hengartner, Peter Steenkiste
    Protecting Access to People Location Information. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:25-38 [Conf]
  7. Howard Chivers, John A. Clark, Susan Stepney
    Smart Devices and Software Agents: The Basics of Good Behaviour. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:39-52 [Conf]
  8. Jürgen Bohn, Felix C. Gärtner, Harald Vogt
    Dependability Issues of Pervasive Computing in a Healthcare Environment. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:53-70 [Conf]
  9. Håkan Kvarnström, Hans Hedbom, Erland Jonsson
    Protecting Security Policies in Ubiquitous Environments Using One-Way Functions. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:71-85 [Conf]
  10. Daniele Gorla, Rosario Pugliese
    Enforcing Security Policies via Types. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:86-100 [Conf]
  11. Axel Schairer
    Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:101-115 [Conf]
  12. Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin
    Authentication for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:116-129 [Conf]
  13. Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen
    End-to-End Trust Starts with Recognition. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:130-142 [Conf]
  14. Laurent Bussard, Yves Roudier
    Embedding Distance-Bounding Protocols within Intuitive Interactions. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:143-156 [Conf]
  15. Philip Robinson, Michael Beigl
    Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:157-172 [Conf]
  16. Tie-Yan Li
    Time Constraint Delegation for P2P Data Decryption. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:173-186 [Conf]
  17. Kemal Bicakci, Nazife Baykal
    SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:187-200 [Conf]
  18. Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels
    Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:201-212 [Conf]
  19. Engelbert Hubbers, Martijn Oostdijk, Erik Poll
    Implementing a Formally Verifiable Security Protocol in Java Card. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:213-226 [Conf]
  20. Hyun-Sung Kim, Kee-Young Yoo
    Cellular Automata Based Multiplier for Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:227-236 [Conf]
  21. Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi
    Enlisting Hardware Architecture to Thwart Malicious Code Injection. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:237-252 [Conf]
  22. Johann Großschädl, Guy-Armand Kamendje
    Optimized RISC Architecture for Multiple-Precision Modular Arithmetic. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:253-270 [Conf]
  23. Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk
    Visual Crypto Displays Enabling Secure Communications. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:271-284 [Conf]
  24. Dieter Hutter, Werner Stephan, Markus Ullmann
    Security and Privacy in Pervasive Computing State of the Art and Future Directions. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:285-289 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002