Trustworthy pervasive computing: the hard security problems | IEEE Conference Publication | IEEE Xplore