2005, ISBN: 9783540255215
This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conf… Meer...
BarnesandNoble.com new in stock. Verzendingskosten:zzgl. Versandkosten., exclusief verzendingskosten Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Amazon.de (Intern... London Lane Company Verzendingskosten:Gewöhnlich versandfertig in 3 bis 4 Tagen. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Amazon.de (Intern... Verzendingskosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Amazon.de (Intern... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Amazon.de (Intern... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Dieter Hutter Editor - nieuw boek
2005, ISBN: 9783540255215
This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conf… Meer...
Hutter, Dieter, Ullmann, Markus:
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek
2008
ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - pocketboek
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… Meer...
Bibliografische gegevens van het best passende boek
auteur: | |
Titel: | |
ISBN: |
Gedetalleerde informatie over het boek. - Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Dieter Hutter Editor
EAN (ISBN-13): 9783540255215
ISBN (ISBN-10): 3540255214
pocket book
Verschijningsjaar: 2005
Uitgever: Springer Berlin Heidelberg Core >1 >T
256 Bladzijden
Gewicht: 0,392 kg
Taal: eng/Englisch
Boek bevindt zich in het datenbestand sinds 2007-06-03T14:25:47+02:00 (Amsterdam)
Detailpagina laatst gewijzigd op 2024-03-14T12:55:43+01:00 (Amsterdam)
ISBN/EAN: 3540255214
ISBN - alternatieve schrijfwijzen:
3-540-25521-4, 978-3-540-25521-5
alternatieve schrijfwijzen en verwante zoekwoorden:
Auteur van het boek: ullmann dieter, hutter, hütter, peter held, hans wagner, springer peter, wägner peter
Titel van het boek: computer security, boppard, second april, security pervasive computing, security 2005, spc
Gegevens van de uitgever
Auteur: Dieter Hutter; Markus Ullmann
Titel: Lecture Notes in Computer Science; Security and Cryptology; Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
Uitgeverij: Springer; Springer Berlin
239 Bladzijden
Verschijningsjaar: 2005-03-30
Berlin; Heidelberg; DE
Taal: Engels
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XI, 239 p.
BC; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; Ambient Intelligence; IT security; Smart Card; communications security; cryptographic protocols; data security; handhelds; healthcare; identity; internet security; mobile computing; security; smart cards; trust; web security; Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; IT Operations; User Interfaces and Human Computer Interaction; Software Engineering; Betriebssysteme; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; Mensch-Computer-Interaktion; EA
Invited Talk (Abstract).- Pervasive Computing – A Case for the Precautionary Principle?.- Session 1: Smart Devices and Applications.- TENeT: A Framework for Distributed Smartcards.- P2P Digital Value Fair Trading System Using Smart Cards.- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.- Invited Talk (Abstract).- Securing Ad Hoc Networks.- Session 2: Short Paper Session.- Secure Identity Management for Pseudo-Anonymous Service Access.- Security Issues for Pervasive Personalized Communication Systems.- Safeguards in a World of Ambient Intelligence.- Session 3: Authentication (I).- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.- Invited Talk (Abstract).- Security Concept of the EU-Passport.- Session 4: Authentication (II).- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.- Ephemeral Pairing on Anonymous Networks.- Invited Talk (Abstract).- EPC Technology.- Session 5: Authentication (III).- Exploiting Empirical Engagement in Authentication Protocol Design.- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.- Look Who’s Talking – Authenticating Service Access Points.- Invited Talk (Abstract).- Security Issues of Mobile Devices.- Session 6: Privacy and Anonymity.- Privacy for Profitable Location Based Services.- On the Anonymity of Periodic Location Samples.- Session 7: Access Control and Information Flow.- A Theorem Proving Approach to Analysis of Secure Information Flow.- An Efficient Access Control Model for Mobile Ad-Hoc Communities.- TrustAC: Trust-Based Access Control for Pervasive Devices.Andere boeken die eventueel grote overeenkomsten met dit boek kunnen hebben:
Laatste soortgelijke boek:
9783030192228 Green, Pervasive, and Cloud Computing (Miani, Rodrigo Camargos, Lasaro Zarpelão, Bruno Rosas, Erika Pasquini, Rafael)
- 9783030192228 Green, Pervasive, and Cloud Computing (Miani, Rodrigo Camargos, Lasaro Zarpelão, Bruno Rosas, Erika Pasquini, Rafael)
- 9783030150921 Green, Pervasive, and Cloud Computing (Shijian Li)
- 9783030150938 Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers Shijian Li E (50-99.99)
- [(Security in Pervasive Computing : Second International Conference, Spc 2005, Boppard, Germany, April 6-8, 2005, Proceedings)] [Volume editor Dieter Hutter ] published on (May, 2005) (Dieter Hutter)
< naar Archief...