3rd International Conference of Security in Pervasive Computing, SPC 2006

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

     =3D Apologies if you receive duplicate copies of this call =3D

The 3rd International Conference of Security in Pervasive Computing,
SPC 2006, will be held in York, England, on 19th and 20th April 2006.

More details are posted at

The security of pervasive computing is a critically important area for
commerce, the public sector, academia and the individual
citizen. Although pervasive computing presents exciting enabling
opportunities, the benefits will only be reaped if security aspects
can be appropriately addressed. Threats exploiting vulnerabilities of
new kinds of user interfaces, displays, operating systems, networks,
and wireless communications give rise to new concerns about loss of
confidentiality, integrity, privacy, and availability. How can these
risks be reduced to an acceptable level?

The first two International Conferences in Security of Pervasive
Computing, hosted at Boppard on the banks of the Rhine in Germany,
were marked by the very high quality of submissions and debate.  SPC
2006 now moves to the historic English city of York, where we hope the
pervasive security community will once again take the area
significantly forward.

Keynote Speaker:  Frank Stajano (University of Cambridge, UK)
                  Security and Usability

Invited Speaker:  Howard Chivers (Cranfield University, UK)
                  Trust without Identification

Accepted papers:

  Constant-Round Password-based Group Session-Key Generation for
  Multi-layer Ad-hoc Networks
      Jin Wook Byun, Su-Mi Lee and Dong Hoon Lee

  Enabling Secure Discovery in a Pervasive Environment
      Slim Trabelsi, Jean-Christophe Pazzaglia and Yves Roudier

  Forward Secure Communication in Wireless Sensor Networks
      Sjouke Mauw, Ivo van Vessem, and Bert Bos

  Low Rate DoS Attack to Monoprocess Servers
      Gabriel Maci=E1 Fern=E1ndez, Jes=FAs E. D=EDaz-Verdejo and Pedro

  Delegating Secure Logging in Pervasive Computing Systems
      Rafael Accorsi and Adolf Hohl

  Implementing Minimized Multivariate Public-Key Cryptosystems on
  Low-Resource Embedded Systems
      Bo-Yin Yang, Chen-Mou Cheng, Bor-Rong Chen and Jiun-Ming Chen

  Higher Dependability and Security for Mobile Applications
      Hongxia Jin

  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor
      Alexander Becher, Zinaida Benenson and Maximillian Dornseif

  The Brave New World of Ambient Intelligence: An Analysis of
  Scenarios regarding Privacy, Identity and Security Issues
      Michael Friedewald, Elena Vildjiounaite, Yves Punie and David

  Profiles and context awareness for mobile users: a middleware
  approach supporting personal security
      Gerald Eichler and Mattias Will

  Privacy Sensitive Location Information Systems in Smart Buildings
      Jodie P. Boyer, Kaijun Tan and Carl A. Gunter

  Silent Cascade: Enhancing Location Privacy without Communication QoS
      Leping Huang, Hiroshi Yamane, Kanta Matsuura and Kaoru Sezaki

  Securing Information Gateways with Derivation-Constrained Access
      Urs Hengartner and Peter Steenkiste

  Information Flow Control to Secure Dynamic Web-Service Composition
      Dieter Hutter and Melanie Volkamer

  Analysing a biometric authentication protocol for 3G mobile systems
  using CSP and rank functions
      Siraj Ahmed Shaikh and Christos K. Dimitriadis

  Attribute-Based Authentication Model for Dynamic Mobile Environments
      Michael J. Covington, Manoj R. Sastry, and Deepak J. Manohar

Important dates:

  Early registration deadline    15 February 2006
  Conference                     19 & 20 April 2006

Registration and further information at:


Conference Proceedings:

  The technical papers are to be published in the Springer Lecture
  Notes on Computer Science (LNCS) series and will be available at the

If you need further information e-mail to: spc-2006@cs.york.ac.uk.

Dr Phil Brooke            School of Computing, University of Teesside

Site Timeline