Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 68, 2005, Proceedings (Lect,Used
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 68, 2005, Proceedings (Lect,Used
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 68, 2005, Proceedings (Lect,Used

Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 68, 2005, Proceedings (Lect,Used

In Stock
SKU: DADAX3540255214
Brand: Springer
Sale price$70.87 Regular price$101.24
Save $30.37
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

This volume contains the papers presented at the 2nd International Conference on Se rityinPervasiveComputing(SPC2005)heldApril68,2005inBoppard,Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFIDchips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, locationbased services,adhocnetworking,resourceallocation/restriction,invisibility,andsecureha ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi ing the papers, the authors for submitting the papers, and the local organizers, and in particular HansPeter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur of fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BSI.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed