Security in pervasive computing: first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2004
|
Schriftenreihe: | Lecture notes in computer science
2802 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XI, 289 S. |
ISBN: | 3540208879 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV017809741 | ||
003 | DE-604 | ||
005 | 20041119 | ||
007 | t | ||
008 | 040127s2004 gw |||| 10||| eng d | ||
016 | 7 | |a 969735138 |2 DE-101 | |
020 | |a 3540208879 |9 3-540-20887-9 | ||
035 | |a (OCoLC)54001422 | ||
035 | |a (DE-599)BVBBV017809741 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-739 |a DE-384 |a DE-91G |a DE-703 |a DE-706 |a DE-188 |a DE-11 | ||
050 | 0 | |a QA76.5915 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 252f |2 stub | ||
245 | 1 | 0 | |a Security in pervasive computing |b first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |c Dieter Hutter ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2004 | |
300 | |a XI, 289 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 2802 | |
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a Droit à la vie privée |2 rasuqam | |
650 | 4 | |a Informatique omniprésente - Sécurité - Mesures - Congrès | |
650 | 7 | |a Informatique omniprésente |2 rasuqam | |
650 | 7 | |a Mesures de sécurité |2 rasuqam | |
650 | 4 | |a Systèmes informatiques - Sécurité - Mesures - Congrès | |
650 | 4 | |a Sécurité informatique - Congrès | |
650 | 7 | |a Sécurité informatique |2 rasuqam | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Ubiquitous computing |v Congresses | |
650 | 0 | 7 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2003 |z Boppard |2 gnd-content | |
689 | 0 | 0 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |D s |
689 | 0 | 1 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 2 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 1 | 1 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 1 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 2 | 1 | |a Ubiquitous Computing |0 (DE-588)4657367-7 |D s |
689 | 2 | 2 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | 3 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Hutter, Dieter |e Sonstige |4 oth | |
711 | 2 | |a International Conference on Security in Pervasive Computing |n 1 |d 2003 |c Boppard |j Sonstige |0 (DE-588)5557804-4 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 2802 |w (DE-604)BV000000607 |9 2802 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010692898 |
Datensatz im Suchindex
_version_ | 1804130504669134848 |
---|---|
adam_text | TABLE
OF
CONTENTS
INVITED
TALKS
(ABSTRACTS)
THE
AGE
OF
PERVASIVE
COMPUTING
-
EVERYTHINGSMART,
EVERYTHINGCONNECTED?
...
1
FRIEDEMANN
MATTERN
CYBER
ASSIST
PROJECT
AND
ITS
SECURITY
REQUIREMENT
.........................
2
HIDEYUKI
NAKASHIMA
SECURITY
IN
PERVASIVE
COMPUTING
.......................................
6
FRANK
STAJANO
THE
IMPORTANCE
OF
HIGH
ASSURANCE
SECURITY
IN
PERVASIVE
COMPUTING
..........
9
PAUL
A.
KARGER
LOCATION
PRIVACY
A
METHODOLOGICALASSESSMENT
OF
LOCATION
PRIVACY
RISKS
IN
WIRELESS
HOTSPOT
NETWORKS
.........................................
10
MARCO
GRUTESER
AND
DIRK
GRUNWALD
PROTECTING
ACCESS
TO
PEOPLE
LOCATION
INFORMATION
.........................
25
URS
HENGARTNER
AND
PETER
STEENKISTE
SECURITY
REQUIREMENTS
SMART
DEVICES
AND
SOFTWARE
AGENTS:
THE
BASICS
OF
GOOD
BEHAVIOUR
..........
39
HOWARD
CHIVERS,
JOHN
A.
CLARK,
AND
SUSAN
STEPNEY
DEPENDABILITY
ISSUES
OF
PERVASIVE
COMPUTING
IN
A
HEALTHCARE
ENVIRONMENT
.....
53
J
¨
URGEN
BOHN,
FELIX
G
¨
ARTNER,
AND
HARALD
VOGT
SECURITY
POLICIES
AND
PROTECTION
PROTECTING
SECURITY
POLICIES
IN
UBIQUITOUS
ENVIRONMENTS
USING
ONE-WAY
FUNCTIONS
............................................
71
H
YY
AKAN
KVARNSTR
¨
OM,
HANS
HEDBOM,
AND
ERLAND
JONSSON
ENFORCING
SECURITY
POLICIES
VIA
TYPES
...................................
86
DANIELE
GORLA
AND
ROSARIO
PUGLIESE
TOWARDS
USING
POSSIBILISTIC
INFORMATIONFLOW
CONTROL
TO
DESIGN
SECURE
MULTIAGENT
SYSTEMS
...................................
101
AXEL
SCHAIRER
X
TABLE
OF
CONTENTS
AUTHENTICATION
AND
TRUST
AUTHENTICATION
FOR
PERVASIVE
COMPUTING
.................................
116
SADIE
CREESE,
MICHAEL
GOLDSMITH,
BILL
ROSCOE,
AND
IRFAN
ZAKIUDDIN
END-TO-ENDTRUST
STARTS
WITH
RECOGNITION
................................
130
JEAN-MARC
SEIGNEUR,
STEPHEN
FARRELL,
CHRISTIAN
DAMSGAARD
JENSEN,
ELIZABETH
GRAY,
AND
YONG
CHEN
EMBEDDING
DISTANCE-BOUNDINGPROTOCOLS
WITHIN
INTUITIVE
INTERACTIONS
.........
143
LAURENT
BUSSARD
AND
YVES
ROUDIER
SECURE
INFRASTRUCTURES
TRUST
CONTEXT
SPACES:
AN
INFRASTRUCTURE
FOR
PERVASIVE
SECURITY
IN
CONTEXT-AWARE
ENVIRONMENTS
........................................
157
PHILIP
ROBINSON
AND
MICHAEL
BEIGL
TIME
CONSTRAINT
DELEGATION
FOR
P2P
DATA
DECRYPTION
.......................
173
TIE-YAN
LI
SAOTS:
A
NEW
EFFICIENT
SERVER
ASSISTED
SIGNATURE
SCHEME
FOR
PERVASIVE
COMPUTING
.............................................
187
KEMAL
BICAKCI
AND
NAZIFE
BAYKAL
SMART
LABELS
SECURITY
AND
PRIVACY
ASPECTS
OF
LOW-COST
RADIO
FREQUENCY
IDENTIFICATION
SYSTEMS
.......................
201
STEPHEN
A.
WEIS,
SANJAY
E.
SARMA,
RONALD
L.
RIVEST,
AND
DANIEL
W.
ENGELS
VERIFICATION
IMPLEMENTING
A
FORMALLY
VERIFIABLE
SECURITY
PROTOCOL
IN
JAVA
CARD
............
213
ENGELBERT
HUBBERS,
MARTIJN
OOSTDIJK,
AND
ERIK
POLL
HARDWARE
ARCHITECTURES
CELLULAR
AUTOMATA
BASED
MULTIPLIER
FOR
PUBLIC-KEY
CRYPTOSYSTEM
.............
227
HYUN-SUNGKIM
AND
KEE-YOUNG
YOO
ENLISTING
HARDWARE
ARCHITECTURE
TO
THWART
MALICIOUS
CODE
INJECTION
..........
237
RUBY
B.
LEE,
DAVID
K.
KARIG,
JOHN
P.
MCGREGOR,
AND
ZHIJIE
SHI
OPTIMIZED
RISC
ARCHITECTURE
FOR
MULTIPLE-PRECISION
MODULAR
ARITHMETIC
.......
253
JOHANN
GROSSSCH
¨
ADL
AND
GUY-ARMAND
KAMENDJE
VISUAL
CRYPTO
DISPLAYS
ENABLING
SECURE
COMMUNICATIONS
...................
271
PIM
TUYLS,
TOM
KEVENAAR,
GEERT-JAN
SCHRIJEN,
TOINE
STARING,
AND
MARTEN
VAN
DIJK
TABLE
OF
CONTENTS
XI
WORKSHOP
SECURITY
AND
PRIVACY
IN
PERVASIVE
COMPUTING
STATE
OF
THE
ART
AND
FUTURE
DIRECTIONS
................................................
285
DIETER
HUTTER,
WERNER
STEPHAN,
AND
MARKUS
ULLMANN
AUTHOR
INDEX
....................................................
291
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV017809741 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.5915 |
callnumber-search | QA76.5915 |
callnumber-sort | QA 276.5915 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 252f |
ctrlnum | (OCoLC)54001422 (DE-599)BVBBV017809741 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03419nam a2200781zcb4500</leader><controlfield tag="001">BV017809741</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20041119 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">040127s2004 gw |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">969735138</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540208879</subfield><subfield code="9">3-540-20887-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54001422</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017809741</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.5915</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in pervasive computing</subfield><subfield code="b">first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers</subfield><subfield code="c">Dieter Hutter ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 289 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">2802</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Droit à la vie privée</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique omniprésente - Sécurité - Mesures - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatique omniprésente</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mesures de sécurité</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes informatiques - Sécurité - Mesures - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité informatique</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ubiquitous computing</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2003</subfield><subfield code="z">Boppard</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Ubiquitous Computing</subfield><subfield code="0">(DE-588)4657367-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hutter, Dieter</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Conference on Security in Pervasive Computing</subfield><subfield code="n">1</subfield><subfield code="d">2003</subfield><subfield code="c">Boppard</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)5557804-4</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">2802</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">2802</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010692898</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2003 Boppard gnd-content |
genre_facet | Konferenzschrift 2003 Boppard |
id | DE-604.BV017809741 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:22:05Z |
institution | BVB |
institution_GND | (DE-588)5557804-4 |
isbn | 3540208879 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010692898 |
oclc_num | 54001422 |
open_access_boolean | |
owner | DE-739 DE-384 DE-91G DE-BY-TUM DE-703 DE-706 DE-188 DE-11 |
owner_facet | DE-739 DE-384 DE-91G DE-BY-TUM DE-703 DE-706 DE-188 DE-11 |
physical | XI, 289 S. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) Berlin [u.a.] Springer 2004 XI, 289 S. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 2802 Includes bibliographical references and index Droit à la vie privée rasuqam Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente rasuqam Mesures de sécurité rasuqam Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique rasuqam Computer security Congresses Ubiquitous computing Congresses Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Ubiquitous Computing (DE-588)4657367-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2003 Boppard gnd-content Mensch-Maschine-Kommunikation (DE-588)4125909-9 s Mobile Computing (DE-588)4694120-4 s Ubiquitous Computing (DE-588)4657367-7 s Datensicherung (DE-588)4011144-1 s DE-604 Privatsphäre (DE-588)4123980-5 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Hutter, Dieter Sonstige oth International Conference on Security in Pervasive Computing 1 2003 Boppard Sonstige (DE-588)5557804-4 oth Lecture notes in computer science 2802 (DE-604)BV000000607 2802 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Lecture notes in computer science Droit à la vie privée rasuqam Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente rasuqam Mesures de sécurité rasuqam Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique rasuqam Computer security Congresses Ubiquitous computing Congresses Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd Mobile Computing (DE-588)4694120-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Privatsphäre (DE-588)4123980-5 gnd Ubiquitous Computing (DE-588)4657367-7 gnd Datensicherung (DE-588)4011144-1 gnd Kryptosystem (DE-588)4209132-9 gnd |
subject_GND | (DE-588)4125909-9 (DE-588)4694120-4 (DE-588)4709127-7 (DE-588)4123980-5 (DE-588)4657367-7 (DE-588)4011144-1 (DE-588)4209132-9 (DE-588)1071861417 |
title | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
title_auth | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
title_exact_search | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
title_full | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) |
title_fullStr | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) |
title_full_unstemmed | Security in pervasive computing first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers Dieter Hutter ... (eds.) |
title_short | Security in pervasive computing |
title_sort | security in pervasive computing first international conference boppard germany march 12 14 2003 revised papers |
title_sub | first International Conference, Boppard, Germany, March 12-14, 2003 : revised papers |
topic | Droit à la vie privée rasuqam Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente rasuqam Mesures de sécurité rasuqam Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique rasuqam Computer security Congresses Ubiquitous computing Congresses Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd Mobile Computing (DE-588)4694120-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Privatsphäre (DE-588)4123980-5 gnd Ubiquitous Computing (DE-588)4657367-7 gnd Datensicherung (DE-588)4011144-1 gnd Kryptosystem (DE-588)4209132-9 gnd |
topic_facet | Droit à la vie privée Informatique omniprésente - Sécurité - Mesures - Congrès Informatique omniprésente Mesures de sécurité Systèmes informatiques - Sécurité - Mesures - Congrès Sécurité informatique - Congrès Sécurité informatique Computer security Congresses Ubiquitous computing Congresses Mensch-Maschine-Kommunikation Mobile Computing Sicherheitsprotokoll Privatsphäre Ubiquitous Computing Datensicherung Kryptosystem Konferenzschrift 2003 Boppard |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010692898&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT hutterdieter securityinpervasivecomputingfirstinternationalconferenceboppardgermanymarch12142003revisedpapers AT internationalconferenceonsecurityinpervasivecomputingboppard securityinpervasivecomputingfirstinternationalconferenceboppardgermanymarch12142003revisedpapers |