Listing 1 - 1 of 1 |
Sort by
|
Choose an application
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.
Data protection --- Computer systems --- Smart cards --- Mobile computing --- Ubiquitous computing --- Protection de l'information (Informatique) --- Systèmes informatiques --- Cartes à mémoire --- Informatique mobile --- Informatique omniprésente --- Congresses. --- Access control --- Security measures --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer systems -- Access control -- Congresses. --- Data protection -- Congresses. --- Mobile computing -- Security measures -- Congresses. --- Smart cards -- Congresses. --- Ubiquitous computing -- Security measures -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Pervasive computing --- UbiComp (Computer science) --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Computers and Society. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Protection --- Distributed processing --- Communication systems --- Embedded computer systems --- Context-aware computing --- Portable computers --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Information Systems. --- Cryptology.
Listing 1 - 1 of 1 |
Sort by
|