2005, ISBN: 9783540255215
This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conf… Altro …
BarnesandNoble.com new in stock. Costi di spedizione:zzgl. Versandkosten., Costi di spedizione aggiuntivi Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Amazon.de (Intern... London Lane Company Costi di spedizione:Gewöhnlich versandfertig in 3 bis 4 Tagen. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Amazon.de (Intern... Costi di spedizione:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Amazon.de (Intern... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Amazon.de (Intern... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Dieter Hutter Editor - nuovo libro
2005, ISBN: 9783540255215
This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conf… Altro …
Hutter, Dieter, Ullmann, Markus:
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile
2008
ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - edizione con copertina flessibile
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Altro …
Dati bibliografici del miglior libro corrispondente
Autore: | |
Titolo: | |
ISBN: |
Informazioni dettagliate del libro - Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Dieter Hutter Editor
EAN (ISBN-13): 9783540255215
ISBN (ISBN-10): 3540255214
Copertina flessibile
Anno di pubblicazione: 2005
Editore: Springer Berlin Heidelberg Core >1 >T
256 Pagine
Peso: 0,392 kg
Lingua: eng/Englisch
Libro nella banca dati dal 2007-06-03T14:25:47+02:00 (Rome)
Pagina di dettaglio ultima modifica in 2024-03-14T12:55:43+01:00 (Rome)
ISBN/EAN: 9783540255215
ISBN - Stili di scrittura alternativi:
3-540-25521-4, 978-3-540-25521-5
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : ullmann dieter, hutter, hütter, peter held, hans wagner, springer peter, wägner peter
Titolo del libro: computer security, boppard, second april, security pervasive computing, security 2005, spc
Dati dell'editore
Autore: Dieter Hutter; Markus Ullmann
Titolo: Lecture Notes in Computer Science; Security and Cryptology; Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
Editore: Springer; Springer Berlin
239 Pagine
Anno di pubblicazione: 2005-03-30
Berlin; Heidelberg; DE
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XI, 239 p.
BC; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; Ambient Intelligence; IT security; Smart Card; communications security; cryptographic protocols; data security; handhelds; healthcare; identity; internet security; mobile computing; security; smart cards; trust; web security; Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; IT Operations; User Interfaces and Human Computer Interaction; Software Engineering; Betriebssysteme; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; Mensch-Computer-Interaktion; EA
Invited Talk (Abstract).- Pervasive Computing – A Case for the Precautionary Principle?.- Session 1: Smart Devices and Applications.- TENeT: A Framework for Distributed Smartcards.- P2P Digital Value Fair Trading System Using Smart Cards.- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.- Invited Talk (Abstract).- Securing Ad Hoc Networks.- Session 2: Short Paper Session.- Secure Identity Management for Pseudo-Anonymous Service Access.- Security Issues for Pervasive Personalized Communication Systems.- Safeguards in a World of Ambient Intelligence.- Session 3: Authentication (I).- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.- Invited Talk (Abstract).- Security Concept of the EU-Passport.- Session 4: Authentication (II).- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.- Ephemeral Pairing on Anonymous Networks.- Invited Talk (Abstract).- EPC Technology.- Session 5: Authentication (III).- Exploiting Empirical Engagement in Authentication Protocol Design.- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.- Look Who’s Talking – Authenticating Service Access Points.- Invited Talk (Abstract).- Security Issues of Mobile Devices.- Session 6: Privacy and Anonymity.- Privacy for Profitable Location Based Services.- On the Anonymity of Periodic Location Samples.- Session 7: Access Control and Information Flow.- A Theorem Proving Approach to Analysis of Secure Information Flow.- An Efficient Access Control Model for Mobile Ad-Hoc Communities.- TrustAC: Trust-Based Access Control for Pervasive Devices.Altri libri che potrebbero essere simili a questo:
Ultimo libro simile:
9783030192228 Green, Pervasive, and Cloud Computing (Miani, Rodrigo Camargos, Lasaro Zarpelão, Bruno Rosas, Erika Pasquini, Rafael)
- 9783030192228 Green, Pervasive, and Cloud Computing (Miani, Rodrigo Camargos, Lasaro Zarpelão, Bruno Rosas, Erika Pasquini, Rafael)
- 9783030150921 Green, Pervasive, and Cloud Computing (Shijian Li)
- 9783030150938 Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers Shijian Li E (50-99.99)
- [(Security in Pervasive Computing : Second International Conference, Spc 2005, Boppard, Germany, April 6-8, 2005, Proceedings)] [Volume editor Dieter Hutter ] published on (May, 2005) (Dieter Hutter)
< Per archiviare...