


default search action
3. SecPerU 2007: Istanbul, Turkey
- Panagiotis Georgiadis, Javier López, Stefanos Gritzalis, Giannis F. Marias:
Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007. IEEE Computer Society 2007, ISBN 0-7695-2863-5 - Zheng Yan
:
Predicting Trustworthiness for Component Software. 1-6 - Bert Bos, Lukasz Chmielewski, Jaap-Henk Hoepman, Thanh Son Nguyen:
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON. 7-12 - Christian Schaefer:
Usage Control Reference Monitor Architecture. 13-18 - Ramanarayana Kandikattu, Lillykutty Jacob:
Secure Routing in Integrated Mobile Ad hoc Network (MANET)-Internet. 19-24 - M. Carmen Fernández Gago, Rodrigo Roman, Javier López
:
A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks. 25-30 - Ji Young Chun, Yong Ho Kim, Jongin Lim, Dong Hoon Lee:
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks. 31-36 - Alexandros Tsakountakis, Georgios Kambourakis
, Stefanos Gritzalis
:
Towards effective Wireless Intrusion Detection in IEEE 802.11i. 37-42 - Rachid Saadi, Jean-Marc Pierson
, Lionel Brunie:
A New Certificate Signature for Pervasive Environment. 43-48 - Nicola Dragoni
, Fabio Massacci
, Christian Schaefer, Thomas Walter, Eric Vétillard:
A Security-by-Contract Architecture for Pervasive Services. 49-54 - Pedro Peris-Lopez
, Julio C. Hernandez-Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. 55-60 - Weijia Wang, Yong Li
, Lei Hu, Li Lu:
Storage-Awareness: RFID Private Authentication based on Sparse Tree. 61-66 - Il-Jung Kim, Eun Young Choi, Dong Hoon Lee:
Secure Mobile RFID system against privacy and security problems. 67-72 - Hwaseong Lee, Eun Young Choi, Su-Mi Lee, Dong Hoon Lee:
Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags. 73-78 - Dimitris Zisiadis
, Spyros Kopsidas, Leandros Tassiulas:
An Architecture for Secure VoIP and Collaboration Applications. 79-84 - Zhongsheng Wu, Zhide Chen, Fuchun Guo
, Li Xu:
Identity Based Private Matching. 85-90

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.