The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Security in Pervasive Computing (spc)
2006 (conf/spc/2006)

  1. Howard Chivers
    Trust Without Identification. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:1-2 [Conf]
  2. Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong
    Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:3-17 [Conf]
  3. Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier
    Enabling Secure Discovery in a Pervasive Environment. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:18-31 [Conf]
  4. Sjouke Mauw, Ivo van Vessem, Bert Bos
    Forward Secure Communication in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:32-42 [Conf]
  5. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Low Rate DoS Attack to Monoprocess Servers. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:43-57 [Conf]
  6. Rafael Accorsi, Adolf Hohl
    Delegating Secure Logging in Pervasive Computing Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:58-72 [Conf]
  7. Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen
    Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:73-88 [Conf]
  8. Hongxia Jin
    Higher Dependability and Security for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:89-103 [Conf]
  9. Alexander Becher, Zinaida Benenson, Maximillian Dornseif
    Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:104-118 [Conf]
  10. Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright
    The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:119-133 [Conf]
  11. Gerald Eichler, Matthias O. Will
    Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:134-148 [Conf]
  12. Jodie P. Boyer, Kaijun Tan, Carl A. Gunter
    Privacy Sensitive Location Information Systems in Smart Buildings. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:149-164 [Conf]
  13. Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki
    Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:165-180 [Conf]
  14. Urs Hengartner, Peter Steenkiste
    Securing Information Gateways with Derivation-Constrained Access Control. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:181-195 [Conf]
  15. Dieter Hutter, Melanie Volkamer
    Information Flow Control to Secure Dynamic Web Service Composition. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:196-210 [Conf]
  16. Siraj A. Shaikh, Christos K. Dimitriadis
    Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:211-226 [Conf]
  17. Michael J. Covington, Manoj R. Sastry, Deepak J. Manohar
    Attribute-Based Authentication Model for Dynamic Mobile Environments. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:227-242 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002