Conferences in DBLP
Lorenz M. Hilty Pervasive Computing - A Case for the Precautionary Principle? [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:1-2 [Conf ] Masayuki Terada , Kensaku Mori , Kazuhiko Ishii , Sadayuki Hongo , Tomonori Usaka , Noboru Koshizuka , Ken Sakamura TENeT: A Framework for Distributed Smartcards. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:3-17 [Conf ] Masayuki Hanadate , Masayuki Terada , Shinji Nagao , Toshiyuki Miyazawa , Yukiko Yosuke , Seiji Tomita , Ko Fujimura P2P Digital Value Fair Trading System Using Smart Cards. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:18-30 [Conf ] Yang Liu , John A. Clark , Susan Stepney "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:31-45 [Conf ] Panagiotis Papadimitratos Securing Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:46-47 [Conf ] Michael Hitchens , Judy Kay , Bob Kummerfeld , Ajay Brar Secure Identity Management for Pseudo-Anonymous Service Access. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:48-55 [Conf ] Bertin Klein , Tristan Miller , Sandra Zilles Security Issues for Pervasive Personalized Communication Systems. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:56-62 [Conf ] Michael Friedewald Safeguards in a World of Ambient Intelligence. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:63-69 [Conf ] Keunwoo Rhee , Jin Kwak , Seungjoo Kim , Dongho Won Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:70-84 [Conf ] Dennis Kügler Security Concept of the EU-Passport. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:85- [Conf ] Stefaan Seys , Bart Preneel Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:86-100 [Conf ] Jaap-Henk Hoepman Ephemeral Pairing on Anonymous Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:101-116 [Conf ] Christian Floerkemeier , Frédéric Thiesse EPC Technology. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:117-118 [Conf ] Sadie Creese , Michael Goldsmith , Richard Harrison , Bill Roscoe , Paul Whittaker , Irfan Zakiuddin Exploiting Empirical Engagement in Authentication Protocol Design. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:119-133 [Conf ] Adam J. Lee , Jodie P. Boyer , Chris Drexelius , Prasad Naldurg , Raquel L. Hill , Roy H. Campbell Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:134-150 [Conf ] Adolf Hohl , Lutz Lowis , Alf Zugenmaier Look Who's Talking - Authenticating Service Access Points. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:151-162 [Conf ] Claudia Eckert Security Issues of Mobile Devices. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:163- [Conf ] Tobias Kölsch , Lothar Fritsch , Markulf Kohlweiss , Dogan Kesdogan Privacy for Profitable Location Based Services. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:164-178 [Conf ] Marco Gruteser , Baik Hoh On the Anonymity of Periodic Location Samples. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:179-192 [Conf ] Ádám Darvas , Reiner Hähnle , David Sands A Theorem Proving Approach to Analysis of Secure Information Flow. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:193-209 [Conf ] Sye Loong Keoh , Emil Lupu An Efficient Access Control Model for Mobile Ad-Hoc Communities. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:210-224 [Conf ] Florina Almenárez Mendoza , Andrés Marín López , Celeste Campo , R. Carlos García TrustAC: Trust-Based Access Control for Pervasive Devices. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:225-238 [Conf ]