Sign in
SecPerU
2006
2006
2006
Keyphrases
Publications
2006
Technical Program Committee.
SecPerU
(2006)
Welcome Message.
SecPerU
(2006)
Dirk Henrici
,
Joachim Götze
,
Paul Müller
A Hash-based Pseudonymization Infrastructure for RFID Systems.
SecPerU
(2006)
Vangelis G. Bintzios
,
Thanasis G. Papaioannou
,
George D. Stamoulis
An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web.
SecPerU
(2006)
Emmanuel Hooper
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS.
SecPerU
(2006)
Additional Reviewers.
SecPerU
(2006)
Zheng Yan
A Conceptual Architecture of a Trusted Mobile Environment.
SecPerU
(2006)
A. Karygiannis
,
E. Antonakakis
,
A. Apostolopoulos
Detecting Critical Nodes for MANET Intrusion Detection Systems.
SecPerU
(2006)
Julien Bringer
,
Hervé Chabanne
,
Emmanuelle Dottax
: a Lightweight Authentication Protocol Secure against Some Attacks.
SecPerU
(2006)
Leonidas Kazatzopoulos
,
Constantinos Delakouridis
,
Giannis F. Marias
,
Panagiotis Georgiadis
iHIDE: Hiding Sources of Information in WSNs.
SecPerU
(2006)
Valentina Casola
,
Luigi Coppolino
,
Antonino Mazzeo
,
Nicola Mazzocca
,
Massimiliano Rak
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
SecPerU
(2006)
Javier López
,
José A. Montenegro
,
Rodrigo Roman
Service-Oriented Security Architecture for CII based on Sensor Networks.
SecPerU
(2006)
Kenji Imamoto
,
Kouichi Sakurai
Enhanced Privacy in Key-Exchange Protocols by One-time ID.
SecPerU
(2006)
Milan Markovic
,
Goran Dordevic
On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors.
SecPerU
(2006)
Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France
SecPerU
(2006)
Bogdan Groza
Using One-Way Chains to Provide Message Authentication without Shared Secrets.
SecPerU
(2006)
Shane Balfe
,
Shiqun Li
,
Jianying Zhou
Pervasive Trusted Computing.
SecPerU
(2006)
Fabio Ricciato
,
Philipp Svoboda
,
Eduard Hasenleithner
,
Wolfgang Fleischer
On the Impact of Unwanted Traffic onto a 3G Network.
SecPerU
(2006)