Skip to main content
  • Conference proceedings
  • © 2004

Security in Pervasive Computing

First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2802)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Location Privacy

    1. Protecting Access to People Location Information

      • Urs Hengartner, Peter Steenkiste
      Pages 25-38
  3. Security Requirements

    1. Smart Devices and Software Agents: The Basics of Good Behaviour

      • Howard Chivers, John A. Clark, Susan Stepney
      Pages 39-52
    2. Dependability Issues of Pervasive Computing in a Healthcare Environment

      • Jürgen Bohn, Felix Gärtner, Harald Vogt
      Pages 53-70
  4. Security Policies and Protection

    1. Protecting Security Policies in Ubiquitous Environments Using One-Way Functions

      • Håkan Kvarnström, Hans Hedbom, Erland Jonsson
      Pages 71-85
    2. Enforcing Security Policies via Types

      • Daniele Gorla, Rosario Pugliese
      Pages 86-100
  5. Authentication and Trust

    1. Authentication for Pervasive Computing

      • Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin
      Pages 116-129
    2. End-to-End Trust Starts with Recognition

      • Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen
      Pages 130-142
    3. Embedding Distance-Bounding Protocols within Intuitive Interactions

      • Laurent Bussard, Yves Roudier
      Pages 143-156
  6. Smart Labels

    1. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

      • Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels
      Pages 201-212
  7. Verification

    1. Implementing a Formally Verifiable Security Protocol in Java Card

      • Engelbert Hubbers, Martijn Oostdijk, Erik Poll
      Pages 213-226

Editors and Affiliations

  • DFKI, Saarbrücken, Germany

    Dieter Hutter

  • Institute of Computer Science and Social Studies, Department of Telematics, Albert-Ludwig University Freiburg, Germany

    Günter Müller

  • German Research Center for Artificial Intelligence, DFKI GmbH,  

    Werner Stephan

  • Federal Office for Information Security (BSI), Bonn, Germany

    Markus Ullmann

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access