Invited Talks (Abstracts) |
The Age of Pervasive Computing - Everything Smart, Everything Connected? / Friedemann Mattern |
Cyber Assist Project and Its Security Requirement / Hideyuki Nakashima |
Security in Pervasive Computin / Frank Stajano |
The Importance of High Assurance Security in Pervasive Computing / Paul A. Karger |
Location Privacy A Methodological Assessment of Location Privacy Risks in Wireless Hotspot |
Networks / Marco Gruteser ; Dirk Grunwald |
Protecting Access to People Location Information / Urs Hengartner ; Peter Steenkiste |
Security Requirements |
Smart Devices and Software Agents: The Basics of Good Behaviour / Howard Chivers ; John A. Clark ; Susan Stepney |
Dependability Issues of Pervasive Computing in a Healthcare Environment / JurgenBohn ; FelixGartner ; HaraldVogt |
Security Policies and Protection |
Protecting Security Policies in Ubiquitous Environments |
Using One-Way Functions / HakanKvarnstrom ; HansHedbom ; ErlandJonsson |
Enforcing Security Policies via Types / Daniele Gorla ; Rosario Pugliese |
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems / Axel Schairer |
Authentication and Trust |
Authentication for Pervasive Computing / Sadie Creese ; Michael Goldsmith ; Bill Roscoe ; Irfan Zakiuddin |
End-to-End Trust Starts with Recognition / Jean-Marc Seigneur ; Stephen Farrell ; Christian Damsgaard Jensen ; Elizabeth Gray ; Yong Chen |
Embedding Distance-Bounding Protocols within Intuitive Interactions / Laurent Bussard and Yves Roudier |
Secure Infrastructures |
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments / Philip Robinson ; Michael Beigl |
Time Constraint Delegation for P2P Data Decryption / Tie-Yan Li |
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing / Kemal Bicakci ; Nazife Baykal |
Smart Labels |
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems / Stephen A. Weis ; Sanjay E. Sarma ; Ronald L. Rivest ; Daniel W. Engels |
Verification |
Implementing a Formally Verifiable Security Protocol in Java Card / Engelbert Hubbers ; Martijn Oostdijk ; Erik Poll |
Hardware Architectures |
Cellular Automata Based Multiplier for Public-Key Cryptosystem / Hyun-Sung Kim ; Kee-Young Yoo |
Enlisting Hardware Architecture to Thwart Malicious Code Injection / Ruby B. Lee ; David K. Karig ; John P. McGregor ; Zhijie Shi |
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic / Johann Großschadl ; Guy-Armand Kamendje |
Visual Crypto Displays Enabling Secure Communications / Pim Tuyls ; Tom Kevenaar ; Geert-Jan Schrijen ; Toine Staring ; Marten van Dijk |
Workshop |
Security and Privacy in Pervasive Computing State of the Art and Future Directions / Dieter Hutter ; Werner Stephan ; Markus Ullmann |
Author Index |
Invited Talks (Abstracts) |
The Age of Pervasive Computing - Everything Smart, Everything Connected? / Friedemann Mattern |
Cyber Assist Project and Its Security Requirement / Hideyuki Nakashima |
Security in Pervasive Computin / Frank Stajano |
The Importance of High Assurance Security in Pervasive Computing / Paul A. Karger |
Location Privacy A Methodological Assessment of Location Privacy Risks in Wireless Hotspot |