Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.16.K. Spett, aSql Injection: Are Your Web Applications Vulnerable?a (SPI Labs White Paper, 2002). 17.L. Armstrong, Phpnuke Sql Injection, (20 February 2003). 18. Improved Mysql Extensions; http://www.php.net/manual/en/ref mysqli.php. 19.
|Title||:||Security and Privacy in the Age of Ubiquitous Computing|
|Author||:||Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura|
|Publisher||:||Springer - 2010-06-03|