Security in Pervasive Computing (Record no. 94884)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05831nam a22006975i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-33377-7 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730193826.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100301s2006 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540333777 |
-- | 978-3-540-33377-7 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/11734666 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Security in Pervasive Computing |
Medium | [electronic resource] : |
Remainder of title | Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings / |
Statement of responsibility, etc. | edited by John A. Clark, Richard F. Paige, Fiona A.C. Polack, Phillip J. Brooke. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2006. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2006. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | X, 243 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 3934 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Invited Talk -- Trust Without Identification -- Protocols -- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems -- Integrity -- Higher Dependability and Security for Mobile Applications -- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks -- Privacy and Security -- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues -- Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security -- Privacy Sensitive Location Information Systems in Smart Buildings -- Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation -- Information Flow and Access Control -- Securing Information Gateways with Derivation-Constrained Access Control -- Information Flow Control to Secure Dynamic Web Service Composition -- Authentication -- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication Model for Dynamic Mobile Environments. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19-21, 2006 in York, UK. The conference focused on methods, tools, principles, and practices for assessing and achievingsecurityinapervasiveenvironment.Newsecurityconceptswerediscussed,in domains and applications such as handheld devices, mobile phones, smartcards, RFID chips, and smart labels, as well as new, emerging technological spaces. The conf- ence also presented work on fundamental themes such as risk identi?cation and mi- gation,security policies for pervasiveenvironments,privacymeasures (especially cr- tographic protocols), and mobility and location-aware services. Submissions included work on biometrics, ambient intelligence, Web services, security requirements, and many other topics. We received 56 submissions, and accepted 16 full papers for presentation. Each submission was reviewed by the international Programme Committee. We are grateful to the Programme Committee members, and the additional reviewers, for their timely completion of the reviewing process, and for the quality and detail of their reviews and discussion. Our thanks go to all members of the ProgrammeCommittee for their efforts; the - ditional reviewers; the authors, for submitting their papers; the keynote speaker, Frank Stajano; the invited speaker, Howard Chivers; and the Department of Computer S- ence, University of York, for supporting the event. April 2006 John A. Clark (Program Chair) Richard F. Paige Fiona A.C. Polack Phillip J. Brooke Organization SPC 2006 was organized by the Department of Computer Science, University of York. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Software engineering. |
9 (RLIN) | 4138 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Operating systems (Computers). |
9 (RLIN) | 5329 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and civilization. |
9 (RLIN) | 21733 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | User interfaces (Computer systems). |
9 (RLIN) | 11681 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Human-computer interaction. |
9 (RLIN) | 6196 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 154669 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Software Engineering. |
9 (RLIN) | 4138 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Operating Systems. |
9 (RLIN) | 37074 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and Society. |
9 (RLIN) | 31668 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | User Interfaces and Human Computer Interaction. |
9 (RLIN) | 31632 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Clark, John A. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 154670 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Paige, Richard F. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 154671 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Polack, Fiona A.C. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 154672 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Brooke, Phillip J. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 154673 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 154674 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540333760 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540822639 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 3934 |
9 (RLIN) | 154675 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/11734666">https://doi.org/10.1007/11734666</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.