Security in pervasive computing: first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2004
|
Schriftenreihe: | Lecture notes in computer science
2802 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XI, 289 S. |
ISBN: | 3540208879 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV017809741 | ||
003 | DE-604 | ||
005 | 20041119 | ||
007 | t| | ||
008 | 040127s2004 gw |||| 10||| eng d | ||
016 | 7 | |a 969735138 |2 DE-101 | |
020 | |a 3540208879 |9 3-540-20887-9 | ||
035 | |a (OCoLC)54001422 | ||
035 | |a (DE-599)BVBBV017809741 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-739 |a DE-384 |a DE-91G |a DE-703 |a DE-706 |a DE-188 |a DE-11 | ||
050 | 0 | |a QA76.5915 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 252f |2 stub | ||
245 | 1 | 0 | |a Security in pervasive computing |b first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |c Dieter Hutter ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2004 | |
300 | |a XI, 289 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 2802 | |
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a Droit à la vie privée |2 rasuqam | |
650 | 4 | |a Informatique omniprésente - Sécurité - Mesures - Congrès | |
650 | 7 | |a Informatique omniprésente |2 rasuqam | |
650 | 7 | |a Mesures de sécurité |2 rasuqam | |
650 | 4 | |a Systèmes informatiques - Sécurité - Mesures - Congrès | |
650 | 4 | |a Sécurité informatique - Congrès | |
650 | 7 | |a Sécurité informatique |2 rasuqam | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Ubiquitous computing |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2003 |z Boppard |2 gnd-content | |
689 | 0 | 0 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |D s |
689 | 0 | 1 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 2 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 1 | 1 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 1 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 2 | 1 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 2 | 2 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | 3 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Hutter, Dieter |e Sonstige |4 oth | |
711 | 2 | |a International Conference on Security in Pervasive Computing |n 1 |d 2003 |c Boppard |j Sonstige |0 (DE-588)5557804-4 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 2802 |w (DE-604)BV000000607 |9 2802 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-010692898 |
Datensatz im Suchindex
_version_ | 1820874932251262976 |
---|---|
adam_text |
TABLE
OF
CONTENTS
INVITED
TALKS
(ABSTRACTS)
THE
AGE
OF
PERVASIVE
COMPUTING
-
EVERYTHINGSMART,
EVERYTHINGCONNECTED?
.
1
FRIEDEMANN
MATTERN
CYBER
ASSIST
PROJECT
AND
ITS
SECURITY
REQUIREMENT
.
2
HIDEYUKI
NAKASHIMA
SECURITY
IN
PERVASIVE
COMPUTING
.
6
FRANK
STAJANO
THE
IMPORTANCE
OF
HIGH
ASSURANCE
SECURITY
IN
PERVASIVE
COMPUTING
.
9
PAUL
A.
KARGER
LOCATION
PRIVACY
A
METHODOLOGICALASSESSMENT
OF
LOCATION
PRIVACY
RISKS
IN
WIRELESS
HOTSPOT
NETWORKS
.
10
MARCO
GRUTESER
AND
DIRK
GRUNWALD
PROTECTING
ACCESS
TO
PEOPLE
LOCATION
INFORMATION
.
25
URS
HENGARTNER
AND
PETER
STEENKISTE
SECURITY
REQUIREMENTS
SMART
DEVICES
AND
SOFTWARE
AGENTS:
THE
BASICS
OF
GOOD
BEHAVIOUR
.
39
HOWARD
CHIVERS,
JOHN
A.
CLARK,
AND
SUSAN
STEPNEY
DEPENDABILITY
ISSUES
OF
PERVASIVE
COMPUTING
IN
A
HEALTHCARE
ENVIRONMENT
.
53
J
¨
URGEN
BOHN,
FELIX
G
¨
ARTNER,
AND
HARALD
VOGT
SECURITY
POLICIES
AND
PROTECTION
PROTECTING
SECURITY
POLICIES
IN
UBIQUITOUS
ENVIRONMENTS
USING
ONE-WAY
FUNCTIONS
.
71
H
YY
AKAN
KVARNSTR
¨
OM,
HANS
HEDBOM,
AND
ERLAND
JONSSON
ENFORCING
SECURITY
POLICIES
VIA
TYPES
.
86
DANIELE
GORLA
AND
ROSARIO
PUGLIESE
TOWARDS
USING
POSSIBILISTIC
INFORMATIONFLOW
CONTROL
TO
DESIGN
SECURE
MULTIAGENT
SYSTEMS
.
101
AXEL
SCHAIRER
X
TABLE
OF
CONTENTS
AUTHENTICATION
AND
TRUST
AUTHENTICATION
FOR
PERVASIVE
COMPUTING
.
116
SADIE
CREESE,
MICHAEL
GOLDSMITH,
BILL
ROSCOE,
AND
IRFAN
ZAKIUDDIN
END-TO-ENDTRUST
STARTS
WITH
RECOGNITION
.
130
JEAN-MARC
SEIGNEUR,
STEPHEN
FARRELL,
CHRISTIAN
DAMSGAARD
JENSEN,
ELIZABETH
GRAY,
AND
YONG
CHEN
EMBEDDING
DISTANCE-BOUNDINGPROTOCOLS
WITHIN
INTUITIVE
INTERACTIONS
.
143
LAURENT
BUSSARD
AND
YVES
ROUDIER
SECURE
INFRASTRUCTURES
TRUST
CONTEXT
SPACES:
AN
INFRASTRUCTURE
FOR
PERVASIVE
SECURITY
IN
CONTEXT-AWARE
ENVIRONMENTS
.
157
PHILIP
ROBINSON
AND
MICHAEL
BEIGL
TIME
CONSTRAINT
DELEGATION
FOR
P2P
DATA
DECRYPTION
.
173
TIE-YAN
LI
SAOTS:
A
NEW
EFFICIENT
SERVER
ASSISTED
SIGNATURE
SCHEME
FOR
PERVASIVE
COMPUTING
.
187
KEMAL
BICAKCI
AND
NAZIFE
BAYKAL
SMART
LABELS
SECURITY
AND
PRIVACY
ASPECTS
OF
LOW-COST
RADIO
FREQUENCY
IDENTIFICATION
SYSTEMS
.
201
STEPHEN
A.
WEIS,
SANJAY
E.
SARMA,
RONALD
L.
RIVEST,
AND
DANIEL
W.
ENGELS
VERIFICATION
IMPLEMENTING
A
FORMALLY
VERIFIABLE
SECURITY
PROTOCOL
IN
JAVA
CARD
.
213
ENGELBERT
HUBBERS,
MARTIJN
OOSTDIJK,
AND
ERIK
POLL
HARDWARE
ARCHITECTURES
CELLULAR
AUTOMATA
BASED
MULTIPLIER
FOR
PUBLIC-KEY
CRYPTOSYSTEM
.
227
HYUN-SUNGKIM
AND
KEE-YOUNG
YOO
ENLISTING
HARDWARE
ARCHITECTURE
TO
THWART
MALICIOUS
CODE
INJECTION
.
237
RUBY
B.
LEE,
DAVID
K.
KARIG,
JOHN
P.
MCGREGOR,
AND
ZHIJIE
SHI
OPTIMIZED
RISC
ARCHITECTURE
FOR
MULTIPLE-PRECISION
MODULAR
ARITHMETIC
.
253
JOHANN
GROSSSCH
¨
ADL
AND
GUY-ARMAND
KAMENDJE
VISUAL
CRYPTO
DISPLAYS
ENABLING
SECURE
COMMUNICATIONS
.
271
PIM
TUYLS,
TOM
KEVENAAR,
GEERT-JAN
SCHRIJEN,
TOINE
STARING,
AND
MARTEN
VAN
DIJK
TABLE
OF
CONTENTS
XI
WORKSHOP
SECURITY
AND
PRIVACY
IN
PERVASIVE
COMPUTING
STATE
OF
THE
ART
AND
FUTURE
DIRECTIONS
.
285
DIETER
HUTTER,
WERNER
STEPHAN,
AND
MARKUS
ULLMANN
AUTHOR
INDEX
.
291 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV017809741 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.5915 |
callnumber-search | QA76.5915 |
callnumber-sort | QA 276.5915 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 252f |
ctrlnum | (OCoLC)54001422 (DE-599)BVBBV017809741 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV017809741</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20041119</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">040127s2004 gw |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">969735138</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540208879</subfield><subfield code="9">3-540-20887-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54001422</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017809741</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.5915</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in pervasive computing</subfield><subfield code="b">first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers</subfield><subfield code="c">Dieter Hutter ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 289 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">2802</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Droit à la vie privée</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique omniprésente - Sécurité - Mesures - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatique omniprésente</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mesures de sécurité</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes informatiques - Sécurité - Mesures - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité informatique</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ubiquitous computing</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2003</subfield><subfield code="z">Boppard</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hutter, Dieter</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Conference on Security in Pervasive Computing</subfield><subfield code="n">1</subfield><subfield code="d">2003</subfield><subfield code="c">Boppard</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)5557804-4</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">2802</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">2802</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010692898</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2003 Boppard gnd-content |
genre_facet | Konferenzschrift 2003 Boppard |
id | DE-604.BV017809741 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:07:35Z |
institution | BVB |
institution_GND | (DE-588)5557804-4 |
isbn | 3540208879 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010692898 |
oclc_num | 54001422 |
open_access_boolean | |
owner | DE-739 DE-384 DE-91G DE-BY-TUM DE-703 DE-706 DE-188 DE-11 |
owner_facet | DE-739 DE-384 DE-91G DE-BY-TUM DE-703 DE-706 DE-188 DE-11 |
physical | XI, 289 S. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) Berlin [u.a.] Springer 2004 XI, 289 S. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 2802 Includes bibliographical references and index Droit à la vie privée rasuqam Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente rasuqam Mesures de sécurité rasuqam Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique rasuqam Computer security Congresses Ubiquitous computing Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Ubiquitous Computing (DE-588)4657367-7 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2003 Boppard gnd-content Mensch-Maschine-Kommunikation (DE-588)4125909-9 s Mobile Computing (DE-588)4694120-4 s Ubiquitous Computing (DE-588)4657367-7 s Datensicherung (DE-588)4011144-1 s DE-604 Privatsphäre (DE-588)4123980-5 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Hutter, Dieter Sonstige oth International Conference on Security in Pervasive Computing 1 2003 Boppard Sonstige (DE-588)5557804-4 oth Lecture notes in computer science 2802 (DE-604)BV000000607 2802 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Lecture notes in computer science Droit à la vie privée rasuqam Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente rasuqam Mesures de sécurité rasuqam Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique rasuqam Computer security Congresses Ubiquitous computing Congresses Datensicherung (DE-588)4011144-1 gnd Ubiquitous Computing (DE-588)4657367-7 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Mobile Computing (DE-588)4694120-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4657367-7 (DE-588)4123980-5 (DE-588)4209132-9 (DE-588)4694120-4 (DE-588)4709127-7 (DE-588)4125909-9 (DE-588)1071861417 |
title | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
title_auth | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
title_exact_search | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
title_full | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) |
title_fullStr | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) |
title_full_unstemmed | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) |
title_short | Security in pervasive computing |
title_sort | security in pervasive computing first international conference boppard germany march 12 14 2003 revised papers |
title_sub | first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
topic | Droit à la vie privée rasuqam Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente rasuqam Mesures de sécurité rasuqam Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique rasuqam Computer security Congresses Ubiquitous computing Congresses Datensicherung (DE-588)4011144-1 gnd Ubiquitous Computing (DE-588)4657367-7 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Mobile Computing (DE-588)4694120-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd |
topic_facet | Droit à la vie privée Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente Mesures de sécurité Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique Computer security Congresses Ubiquitous computing Congresses Datensicherung Ubiquitous Computing Privatsphäre Kryptosystem Mobile Computing Sicherheitsprotokoll Mensch-Maschine-Kommunikation Konferenzschrift 2003 Boppard |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT hutterdieter securityinpervasivecomputingfirstinternationalconferenceboppardgermanymarch12142003revisedpapers AT internationalconferenceonsecurityinpervasivecomputingboppard securityinpervasivecomputingfirstinternationalconferenceboppardgermanymarch12142003revisedpapers |