|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 4 occurrences of 4 keywords
|
|
|
Results
Found 34 publication records. Showing 34 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bert Bos, Lukasz Chmielewski, Jaap-Henk Hoepman, Thanh Son Nguyen |
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 7-12, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Hwaseong Lee, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 |
Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 73-78, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Weijia Wang, Yong Li 0002, Lei Hu, Li Lu 0001 |
Storage-Awareness: RFID Private Authentication based on Sparse Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 61-66, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ji Young Chun, Yong Ho Kim, Jongin Lim 0001, Dong Hoon Lee 0001 |
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 31-36, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | M. Carmen Fernández Gago, Rodrigo Roman, Javier López 0001 |
A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 25-30, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zhongsheng Wu, Zhide Chen, Fuchun Guo, Li Xu 0002 |
Identity Based Private Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 85-90, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Georgiadis 0001, Javier López 0001, Stefanos Gritzalis, Giannis F. Marias (eds.) |
Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![IEEE Computer Society, 0-7695-2863-5 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Rachid Saadi, Jean-Marc Pierson, Lionel Brunie |
A New Certificate Signature for Pervasive Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 43-48, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ramanarayana Kandikattu, Lillykutty Jacob |
Secure Routing in Integrated Mobile Ad hoc Network (MANET)-Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 19-24, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 55-60, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Il-Jung Kim, Eun Young Choi, Dong Hoon Lee 0001 |
Secure Mobile RFID system against privacy and security problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 67-72, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dimitris Zisiadis, Spyros Kopsidas, Leandros Tassiulas |
An Architecture for Secure VoIP and Collaboration Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 79-84, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Yan 0002 |
Predicting Trustworthiness for Component Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 1-6, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nicola Dragoni, Fabio Massacci, Christian Schaefer, Thomas Walter 0001, Eric Vétillard |
A Security-by-Contract Architecture for Pervasive Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 49-54, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
Towards effective Wireless Intrusion Detection in IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 37-42, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Christian Schaefer |
Usage Control Reference Monitor Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 13-18, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Technical Program Committee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Welcome Message. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dirk Henrici, Joachim Götze, Paul Müller 0001 |
A Hash-based Pseudonymization Infrastructure for RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 22-27, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Vangelis G. Bintzios, Thanasis G. Papaioannou, George D. Stamoulis |
An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 69-74, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 16-21, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Additional Reviewers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Yan 0002 |
A Conceptual Architecture of a Trusted Mobile Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 75-81, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | A. Karygiannis, E. Antonakakis, A. Apostolopoulos |
Detecting Critical Nodes for MANET Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 7-15, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
edge-cut, vertex-cut, security, mobile ad hoc network, MANET, intrusion detection, IDS |
1 | Julien Bringer, Hervé Chabanne, Emmanuelle Dottax |
HB++: a Lightweight Authentication Protocol Secure against Some Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 28-33, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
We here show how a modification of the HB+ protocol thwarts Gilbert et al’s attack, The resulting protocol, HB++, remains a good choice for RFID authentication |
1 | Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias, Panagiotis Georgiadis 0001 |
iHIDE: Hiding Sources of Information in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 41-48, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Valentina Casola, Luigi Coppolino, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak |
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 34-40, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Javier López 0001, José A. Montenegro, Rodrigo Roman |
Service-Oriented Security Architecture for CII based on Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 1-6, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Imamoto, Kouichi Sakurai |
Enhanced Privacy in Key-Exchange Protocols by One-time ID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 63-68, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Milan Markovic, Goran Dordevic |
On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 57-62, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![IEEE Computer Society, 0-7695-2549-0 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Bogdan Groza |
Using One-Way Chains to Provide Message Authentication without Shared Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 82-87, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shane Balfe, Shiqun Li, Jianying Zhou 0001 |
Pervasive Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 88-94, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Ricciato, Philipp Svoboda, Eduard Hasenleithner, Wolfgang Fleischer |
On the Impact of Unwanted Traffic onto a 3G Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 49-56, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #34 of 34 (100 per page; Change: )
|
|