Trustworthy ubiquitous computing /
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Paris
Imprint: Atlantis Press,
2012.
Paris 2012. |
Series: | Atlantis Ambient and Pervasive Intelligence,
6 |
Subjects: | |
Online Access: | Click here to view the full text content |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- <p>The automatic Trust Management of self-adaptive Multi-Display Environments
- Malicious Pixels - Using QR Codes as Attack Vector
- A Virtual Performance Stage as a Space for Children to Create and Perform Stories
- Network Forensics: Detection and Mitigation of Botnet and Malicious Code via Darknet
- Trusted Log Management System
- Reasoning of Collaborative Human Behaviour in Security-Critical Work Practices: A Framework
- Mitigation ofWormhole Attack in Wireless Sensor Networks
- Protocol for Secure Access in Mobile Ad-hoc Network for Emergency Services
- A Lightweight Graph-Based Pattern Recognition Scheme in Mobile Ad Hoc Networks
- Security Framework for Mobile Banking
- Anonymous, Secure and Fair Micropayment System to Access Location-Based Services.- Privacy Preserving with A Purpose-based Privacy Data Graph. </p>.