Skip to main content
  • Conference proceedings
  • © 2005

Security and Privacy in the Age of Ubiquitous Computing

IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan

  • Presents the most up-to-date research on information security issues including practical applications
  • Includes supplementary material: sn.pub/extras

Conference proceedings info: SEC 2005.

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (40 papers)

  1. Front Matter

    Pages i-xvi
  2. Regular Papers

    1. Front Matter

      Pages 1-1
    2. Accountable Anonymous E-Mail

      • Vincent Naessens, Bart De Decker, Liesje Demuynck
      Pages 3-18
    3. Protecting Consumer Data in Composite Web Services

      • Craig Pearce, Peter Bertok, Ron Van Schyndel
      Pages 19-34
    4. A Decision Matrix Approach

      • Albin Zuccato
      Pages 35-49
    5. Assignment of Security Clearances in an Organization

      • Lech J. Janczewski, Victor Portougal
      Pages 51-63
    6. Tool Supported Management of Information Security Culture

      • Thomas Schlienger, Stephanie Teufel
      Pages 65-77
    7. ERPSEC - A Reference Framework to Enhance Security in ERP Systems

      • S. H. von Solms, M. P. Hertenberger
      Pages 79-94
    8. A Secure Quantum Communication Protocol Using Insecure Public Channels

      • I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo
      Pages 113-126
    9. Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems

      • Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano
      Pages 127-142
    10. Design and Implementation of TPM SUP320

      • Jiangchun Ren, Kui Dai, Zhiying Wang, Xuemi Zhao, Yuanman Tong
      Pages 143-153
    11. Mathematical Models of IP Traceback Methods and Their Verification

      • Keisuke Ohmori, Ayako Suzuki, Manabu Ohmuro, Toshifumi Kai, Mariko Kawabata, Ryu Matushima et al.
      Pages 155-169
    12. Transferable E-Cash Revisit

      • Joseph K. Liu, Sandy H. Wong, Duncan S. Wong
      Pages 171-188
    13. A License Transfer System for Supporting Content Portability in Digital Rights Management

      • Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
      Pages 189-204
    14. Secure Human Communications Based on Biometrics Signals

      • Yongdong Wu, Feng Bao, Robert H. Deng
      Pages 205-221
    15. Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks

      • Laurent Bussard, Walid Bagga
      Pages 223-238
    16. An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN

      • Kyung-jun Kim, Hyun-sook Kim, Sang-don Lee, Ki-jun Han
      Pages 239-249
    17. The Pairing Problem with User Interaction

      • Thomas Peyrin, Serge Vaudenay
      Pages 251-265
    18. Network Smart Card

      • Asad Ali, Karen Lu, Michael Montgomery
      Pages 267-280

Other Volumes

  1. Security and Privacy in the Age of Ubiquitous Computing

About this book

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Editors and Affiliations

  • Tokyo Denki University, Japan

    Ryoichi Sasaki

  • Chinese Academy of Sciences, China

    Sihan Qing

  • University of Tsukuba, Japan

    Eiji Okamoto

  • University of Electro-Communications, Japan

    Hiroshi Yoshiura

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access