The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Security in Pervasive Computing (spc)
2005 (conf/spc/2005)

  1. Lorenz M. Hilty
    Pervasive Computing - A Case for the Precautionary Principle? [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:1-2 [Conf]
  2. Masayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura
    TENeT: A Framework for Distributed Smartcards. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:3-17 [Conf]
  3. Masayuki Hanadate, Masayuki Terada, Shinji Nagao, Toshiyuki Miyazawa, Yukiko Yosuke, Seiji Tomita, Ko Fujimura
    P2P Digital Value Fair Trading System Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:18-30 [Conf]
  4. Yang Liu, John A. Clark, Susan Stepney
    "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:31-45 [Conf]
  5. Panagiotis Papadimitratos
    Securing Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:46-47 [Conf]
  6. Michael Hitchens, Judy Kay, Bob Kummerfeld, Ajay Brar
    Secure Identity Management for Pseudo-Anonymous Service Access. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:48-55 [Conf]
  7. Bertin Klein, Tristan Miller, Sandra Zilles
    Security Issues for Pervasive Personalized Communication Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:56-62 [Conf]
  8. Michael Friedewald
    Safeguards in a World of Ambient Intelligence. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:63-69 [Conf]
  9. Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won
    Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:70-84 [Conf]
  10. Dennis Kügler
    Security Concept of the EU-Passport. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:85- [Conf]
  11. Stefaan Seys, Bart Preneel
    Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:86-100 [Conf]
  12. Jaap-Henk Hoepman
    Ephemeral Pairing on Anonymous Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:101-116 [Conf]
  13. Christian Floerkemeier, Frédéric Thiesse
    EPC Technology. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:117-118 [Conf]
  14. Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin
    Exploiting Empirical Engagement in Authentication Protocol Design. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:119-133 [Conf]
  15. Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell
    Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:134-150 [Conf]
  16. Adolf Hohl, Lutz Lowis, Alf Zugenmaier
    Look Who's Talking - Authenticating Service Access Points. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:151-162 [Conf]
  17. Claudia Eckert
    Security Issues of Mobile Devices. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:163- [Conf]
  18. Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan
    Privacy for Profitable Location Based Services. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:164-178 [Conf]
  19. Marco Gruteser, Baik Hoh
    On the Anonymity of Periodic Location Samples. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:179-192 [Conf]
  20. Ádám Darvas, Reiner Hähnle, David Sands
    A Theorem Proving Approach to Analysis of Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:193-209 [Conf]
  21. Sye Loong Keoh, Emil Lupu
    An Efficient Access Control Model for Mobile Ad-Hoc Communities. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:210-224 [Conf]
  22. Florina Almenárez Mendoza, Andrés Marín López, Celeste Campo, R. Carlos García
    TrustAC: Trust-Based Access Control for Pervasive Devices. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:225-238 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002