The Community for Technology Leaders
Security, Privacy and Trust in Pervasive and Ubiquitous Computing, International Workshop on (2006)
Lyon, France
June 29, 2006 to June 29, 2006
ISBN: 0-7695-2549-0
TABLE OF CONTENTS
Papers

Service-Oriented Security Architecture for CII based on Sensor Networks (Abstract)

Javier Lopez , University of Malaga, Spain
Rodrigo Roman , University of Malaga, Spain
Jose Antonio Montenegro , University of Malaga, Spain
pp. 1-6

Detecting Critical Nodes for MANET Intrusion Detection Systems (Abstract)

A. Karygiannis , National Institute of Standards and Technology
A. Apostolopoulos , National Institute of Standards and Technology
E. Antonakakis , National Institute of Standards and Technology
pp. 7-15

A Hash-based Pseudonymization Infrastructure for RFID Systems (Abstract)

Paul M? , University of Kaiserslautern, Germany
Dirk Henrici , University of Kaiserslautern, Germany
Joachim G?tze , University of Kaiserslautern, Germany
pp. 22-27

HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks (Abstract)

Emmanuelle Dottax , Sagem Defense Securite, France
Herv?e Chabanne , Sagem Defense Securite, France
Julien Bringer , Sagem Defense Securite, France
pp. 28-33

Design and implementation of TruMan, a Trust Manager Component for Distributed Systems (Abstract)

Massimiliano Rak , Seconda Universita? di Napoli, Italy
Antonino Mazzeo , Universita? degli Studi di Napoli, Federico II, Italy
Valentina Casola , Universita? degli Studi di Napoli, Federico II, Italy
Nicola Mazzocca , Universita? degli Studi di Napoli, Federico II, Italy
Luigi Coppolino , Universita? degli Studi di Napoli, Federico II, Italy
pp. 34-40

iHIDE: Hiding Sources of Information in WSNs (Abstract)

L. Kazatzopoulos , University of Athens, Greece
C. Delakouridis , University of Athens, Greece
G. F. Marias , University of Athens, Greece
P. Georgiadis , University of Athens, Greece
pp. 41-48

On the Impact of Unwanted Traffic onto a 3G Network (Abstract)

Philipp Svoboda , Technical University of Vienna
Wolfgang Fleischer , mobilkom austria AG&CoKG
Eduard Hasenleithner , Forschungszentrum Telekommunikation Wien (ftw.)
Fabio Ricciato , Forschungszentrum Telekommunikation Wien (ftw.)
pp. 49-56

On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors (Abstract)

Goran Dordevic , National Bank of Serbia, Serbia and Montenegro
Milan Markovic , Banca Intesa ad.Beograd, Serbia and Montenegro
pp. 57-62

Enhanced Privacy in Key-Exchange Protocols by One-time ID (Abstract)

Kenji Imamoto , Kyushu University, Japan
Kouichi Sakurai , Kyushu University, Japan
pp. 63-68

An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web (Abstract)

George D. Stamoulis , Athens University of Economics and Business, Greece
Thanasis G. Papaioannou , Athens University of Economics and Business, Greece
Vangelis G. Bintzios , Athens University of Economics and Business, Greece
pp. 69-74

A Conceptual Architecture of a Trusted Mobile Environment (Abstract)

Zheng Yan , Nokia Research Center, Finland
pp. 75-81

Using One-Way Chains to Provide Message Authentication without Shared Secrets (Abstract)

Bogdan Groza , Politehnica University of Timisoara, Romania
pp. 82-87

Pervasive Trusted Computing (Abstract)

Jianying Zhou , Institute for InfoComm Research, Singapore
Shiqun Li , Shanghai Jiao Tong University, China
Shane Balfe , Royal Holloway, University of London, UK
pp. 88-94
Author Index

Author Index (PDF)

pp. 95
97 ms
(Ver 3.1 (10032016))