Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10


Reviews | Bibliographic data
  • Full bibliographic data for Security in Pervasive Computing

    Security in Pervasive Computing
    Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
    Authors and contributors
    Volume editor John A. Clark, Volume editor Richard F. Paige, Volume editor Fiona A.C. Polack, Volume editor Phillip J. Brooke
    Physical properties
    Format: Paperback
    Number of pages: 260
    Width: 155 mm
    Height: 234 mm
    Thickness: 15 mm
    Weight: 363 g
    ISBN 13: 9783540333760
    ISBN 10: 3540333762

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    LC subject heading: ,
    BISAC V2.8: COM032000
    B&T Modifier: Region of Publication: 04
    B&T Modifier: Academic Level: 03
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    B&T Merchandise Category: COM
    BISAC V2.8: BUS083000, COM046000, COM014000
    Ingram Subject Code: XL
    LC classification: QA76.9.A25
    BISAC V2.8: COM051230
    LC classification: QA76.9.C66
    B&T Modifier: Text Format: 05
    BIC subject category V2: URY
    BISAC V2.8: COM079000
    Warengruppen-Systematik des deutschen Buchhandels: 16360
    BISAC V2.8: COM053000
    DC22: 005.8
    BISAC V2.8: COM043000
    LC classification: QA76.9.H85
    LC subject heading:
    LC classification: QA76.758, QA76.9.U83
    BISAC V2.8: COM075000, COM070000
    Libri: DATE6350
    LC classification: QA76.76.O63
    LC subject heading:
    LC classification: QA76.5915 .I58 2006, QA75.5-76.95, TK5105.5-5105.9
    LC subject heading:
    Thema V1.0: UBJ, UT, UK, UR, KJMK, UL, UYZG, URY
    Edition statement
    2006 ed.
    Illustrations note
    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
    Imprint name
    Springer-Verlag Berlin and Heidelberg GmbH & Co. K
    Publication date
    15 May 2006
    Publication City/Country
    Table of contents
    Invited Talk.- Trust Without Identification.- Protocols.- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.- Enabling Secure Discovery in a Pervasive Environment.- Forward Secure Communication in Wireless Sensor Networks.- Mechanisms.- Low Rate DoS Attack to Monoprocess Servers.- Delegating Secure Logging in Pervasive Computing Systems.- Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.- Integrity.- Higher Dependability and Security for Mobile Applications.- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.- Privacy and Security.- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues.- Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security.- Privacy Sensitive Location Information Systems in Smart Buildings.- Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation.- Information Flow and Access Control.- Securing Information Gateways with Derivation-Constrained Access Control.- Information Flow Control to Secure Dynamic Web Service Composition.- Authentication.- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.- Attribute-Based Authentication Model for Dynamic Mobile Environments.