2005, ISBN: 9783540255215
This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conf… mais…
BarnesandNoble.com new in stock. Custos de envio:zzgl. Versandkosten., mais custos de envio Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Amazon.de (Intern... London Lane Company Custos de envio:Gewöhnlich versandfertig in 3 bis 4 Tagen. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Amazon.de (Intern... Custos de envio:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Amazon.de (Intern... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Amazon.de (Intern... |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Dieter Hutter Editor - nuovo livro
2005, ISBN: 9783540255215
This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conf… mais…
Hutter, Dieter, Ullmann, Markus:
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso
2008
ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science, 3450, Band 3450) - Livro de bolso
2008, ISBN: 9783540255215
Springer, Taschenbuch, Auflage: 2005, 252 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: Illustrations, 0.36 kg, Informationsmanagement, Management, Busine… mais…
Dados bibliográficos do melhor livro correspondente
Autor: | |
Título: | |
Número ISBN: |
Dados detalhados do livro - Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Dieter Hutter Editor
EAN (ISBN-13): 9783540255215
ISBN (ISBN-10): 3540255214
Livro de bolso
Ano de publicação: 2005
Editor/Editora: Springer Berlin Heidelberg Core >1 >T
256 Páginas
Peso: 0,392 kg
Língua: eng/Englisch
Livro na base de dados desde 2007-06-03T09:25:47-03:00 (Sao Paulo)
Página de detalhes modificada pela última vez em 2024-03-14T08:55:43-03:00 (Sao Paulo)
Número ISBN/EAN: 9783540255215
Número ISBN - Ortografia alternativa:
3-540-25521-4, 978-3-540-25521-5
Ortografia alternativa e termos de pesquisa relacionados:
Autor do livro: ullmann dieter, hutter, hütter, peter held, hans wagner, springer peter, wägner peter
Título do livro: computer security, boppard, second april, security pervasive computing, security 2005, spc
Dados da editora
Autor: Dieter Hutter; Markus Ullmann
Título: Lecture Notes in Computer Science; Security and Cryptology; Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
Editora: Springer; Springer Berlin
239 Páginas
Ano de publicação: 2005-03-30
Berlin; Heidelberg; DE
Língua: Inglês
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XI, 239 p.
BC; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; Ambient Intelligence; IT security; Smart Card; communications security; cryptographic protocols; data security; handhelds; healthcare; identity; internet security; mobile computing; security; smart cards; trust; web security; Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; IT Operations; User Interfaces and Human Computer Interaction; Software Engineering; Betriebssysteme; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; Mensch-Computer-Interaktion; EA
Invited Talk (Abstract).- Pervasive Computing – A Case for the Precautionary Principle?.- Session 1: Smart Devices and Applications.- TENeT: A Framework for Distributed Smartcards.- P2P Digital Value Fair Trading System Using Smart Cards.- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.- Invited Talk (Abstract).- Securing Ad Hoc Networks.- Session 2: Short Paper Session.- Secure Identity Management for Pseudo-Anonymous Service Access.- Security Issues for Pervasive Personalized Communication Systems.- Safeguards in a World of Ambient Intelligence.- Session 3: Authentication (I).- Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.- Invited Talk (Abstract).- Security Concept of the EU-Passport.- Session 4: Authentication (II).- Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.- Ephemeral Pairing on Anonymous Networks.- Invited Talk (Abstract).- EPC Technology.- Session 5: Authentication (III).- Exploiting Empirical Engagement in Authentication Protocol Design.- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.- Look Who’s Talking – Authenticating Service Access Points.- Invited Talk (Abstract).- Security Issues of Mobile Devices.- Session 6: Privacy and Anonymity.- Privacy for Profitable Location Based Services.- On the Anonymity of Periodic Location Samples.- Session 7: Access Control and Information Flow.- A Theorem Proving Approach to Analysis of Secure Information Flow.- An Efficient Access Control Model for Mobile Ad-Hoc Communities.- TrustAC: Trust-Based Access Control for Pervasive Devices.Outros livros adicionais, que poderiam ser muito similares com este livro:
Último livro semelhante:
9783030192228 Green, Pervasive, and Cloud Computing (Miani, Rodrigo Camargos, Lasaro Zarpelão, Bruno Rosas, Erika Pasquini, Rafael)
- 9783030192228 Green, Pervasive, and Cloud Computing (Miani, Rodrigo Camargos, Lasaro Zarpelão, Bruno Rosas, Erika Pasquini, Rafael)
- 9783030150921 Green, Pervasive, and Cloud Computing (Shijian Li)
- 9783030150938 Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers Shijian Li E (50-99.99)
- [(Security in Pervasive Computing : Second International Conference, Spc 2005, Boppard, Germany, April 6-8, 2005, Proceedings)] [Volume editor Dieter Hutter ] published on (May, 2005) (Dieter Hutter)
< Para arquivar...