The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SPC"( http://dblp.L3S.de/Venues/SPC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/spc

Publication years (Num. hits)
2003 (24) 2004 (1) 2005 (23) 2006 (18)
Publication types (Num. hits)
inproceedings(63) proceedings(3)
Venues (Conferences, Journals, ...)
SPC(66)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 18 occurrences of 18 keywords

Results
Found 66 publication records. Showing 66 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sjouke Mauw, Ivo van Vessem, Bert Bos Forward Secure Communication in Wireless Sensor Networks. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee 0001, Dowon Hong Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-layer ad-hoc network, pervasive computing, heterogeneous, key agreement, Password authentication, authenticated key exchange
1Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, embedded system, efficient implementation, motes, digital signature schemes, Multivariate public-key cryptosystem
1Rafael Accorsi, Adolf Hohl Delegating Secure Logging in Pervasive Computing Systems. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Urs Hengartner, Peter Steenkiste Securing Information Gateways with Derivation-Constrained Access Control. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jodie P. Boyer, Kaijun Tan, Carl A. Gunter Privacy Sensitive Location Information Systems in Smart Buildings. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Siraj A. Shaikh, Christos K. Dimitriadis Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hongxia Jin Higher Dependability and Security for Mobile Applications. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gerald Eichler, Matthias O. Will Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alexander Becher, Zinaida Benenson, Maximillian Dornseif Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier Enabling Secure Discovery in a Pervasive Environment. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Low Rate DoS Attack to Monoprocess Servers. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Howard Chivers Trust Without Identification. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael J. Covington, Manoj R. Sastry, Deepak J. Manohar Attribute-Based Authentication Model for Dynamic Mobile Environments. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dieter Hutter, Melanie Volkamer Information Flow Control to Secure Dynamic Web Service Composition. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright 0003 The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke (eds.) Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dieter Hutter, Markus Ullmann (eds.) Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jaap-Henk Hoepman Ephemeral Pairing on Anonymous Networks. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Christian Floerkemeier, Frédéric Thiesse EPC Technology. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Adolf Hohl, Lutz Lowis, Alf Zugenmaier Look Who's Talking - Authenticating Service Access Points. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sye Loong Keoh, Emil Lupu An Efficient Access Control Model for Mobile Ad-Hoc Communities. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yang Liu 0029, John A. Clark, Susan Stepney "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security requirements, Ubiquitous systems, process patterns
1Claudia Eckert 0001 Security Issues of Mobile Devices. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dennis Kügler Security Concept of the EU-Passport. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ádám Darvas, Reiner Hähnle, David Sands 0001 A Theorem Proving Approach to Analysis of Secure Information Flow. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Masayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura TENeT: A Framework for Distributed Smartcards. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Florina Almenárez, Andrés Marín López, Celeste Campo, R. Carlos García TrustAC: Trust-Based Access Control for Pervasive Devices. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Hitchens, Judy Kay, Bob Kummerfeld, Ajay Brar Secure Identity Management for Pseudo-Anonymous Service Access. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, RFID system, Challenge-Response
1Stefaan Seys, Bart Preneel Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan Privacy for Profitable Location Based Services. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Lorenz M. Hilty Pervasive Computing - A Case for the Precautionary Principle? Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin Exploiting Empirical Engagement in Authentication Protocol Design. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Friedewald Safeguards in a World of Ambient Intelligence. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bertin Klein, Tristan Miller, Sandra Zilles Security Issues for Pervasive Personalized Communication Systems. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Masayuki Hanadate, Masayuki Terada, Shinji Nagao, Toshiyuki Miyazawa, Yukiko Yosuke, Seiji Tomita, Ko Fujimura P2P Digital Value Fair Trading System Using Smart Cards. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Panagiotis Papadimitratos Securing Ad Hoc Networks. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Marco Gruteser, Baik Hoh On the Anonymity of Periodic Location Samples. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dieter Hutter, Günter Müller, Werner Stephan 0001, Markus Ullmann (eds.) Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers Search on Bibsonomy SPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi Enlisting Hardware Architecture to Thwart Malicious Code Injection. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Johann Großschädl, Guy-Armand Kamendje Optimized RISC Architecture for Multiple-Precision Modular Arithmetic. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA Algorithm, Finely IntegratedOperand Scanning (FIOS), Multi-Application Smart Cards, Montgomery Multiplication
1Kemal Bicakci, Nazife Baykal SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Håkan Kvarnström, Hans Hedbom, Erland Jonsson Protecting Security Policies in Ubiquitous Environments Using One-Way Functions. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Marco Gruteser, Dirk Grunwald A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin Authentication for Pervasive Computing. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Engelbert Hubbers, Martijn Oostdijk, Erik Poll Implementing a Formally Verifiable Security Protocol in Java Card. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Axel Schairer Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dieter Hutter, Werner Stephan 0001, Markus Ullmann Security and Privacy in Pervasive Computing State of the Art and Future Directions. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jürgen Bohn 0001, Felix C. Gärtner, Harald Vogt Dependability Issues of Pervasive Computing in a Healthcare Environment. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hideyuki Nakashima Cyber Assist Project and Its Security Requirement. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Frank Stajano Security in Pervasive Computing. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Friedemann Mattern The Age of Pervasive Computing? Everything Smart, Everything Connected? Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen End-to-End Trust Starts with Recognition. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Laurent Bussard, Yves Roudier Embedding Distance-Bounding Protocols within Intuitive Interactions. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hyun-Sung Kim 0001, Kee-Young Yoo Cellular Automata Based Multiplier for Public-Key Cryptosystem. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Urs Hengartner, Peter Steenkiste Protecting Access to People Location Information. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Daniele Gorla, Rosario Pugliese Enforcing Security Policies via Types. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Philip Robinson, Michael Beigl Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Paul A. Karger The Importance of High Assurance Security in Pervasive Computing. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tieyan Li Time Constraint Delegation for P2P Data Decryption. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Howard Chivers, John A. Clark, Susan Stepney Smart Devices and Software Agents: The Basics of Good Behaviour. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk Visual Crypto Displays Enabling Secure Communications. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #66 of 66 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license