Wonder Club world wonders pyramid logo
×

Security for ubiquitous computing Book

Security for ubiquitous computing
Security for ubiquitous computing, * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-establi, Security for ubiquitous computing has a rating of 2.5 stars
   2 Ratings
X
Security for ubiquitous computing, * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks * Focuses on two very hot topics: ad-hoc wireless networking and security * Covers security issues for well-establi, Security for ubiquitous computing
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Security for ubiquitous computing
  • Written by author Frank Stajano
  • Published by Chichester John Wiley & Sons, cop. 2002, 2002/02/12
  • * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks * Focuses on two very hot topics: ad-hoc wireless networking and security * Covers security issues for well-establi
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

About the Author.

Forward.

Preface.

Acknowledgements.

Contact Information.

1. Introduction.

Scenario.

Essential terminology.

Problems.

Notation.

2. Ubiquitous computing.

Xerox PARC.

Norman's Invisible Computer.

MIT.

HP's Cooltown.

ORL/AT&T Labs Cambridge.

Security issues.

3. Computer security.

Confidentiality.

Integrity.

Availability.

Authentication.

Security policies.

4. Authentication.

New preconditions.

The Resurrecting Duckling security policy model.

The many ways of being a master.

5. Confidentiality.

Cryptographic primitives for peanut processors.

Personal privacy.

6. Integrity.

Message integrity.

Device integrity.

7. Availability.

Threats to the communications channel.

Threats to the battery energy.

Threats from mobile code.

8. Anonymity.

The Cocaine Auction Protocol.

The anonymity layer.

9. Conclusions.

Appendix A: A Short Primer on Functions.

Appendix B: Existing Network Security Solutions.

Annotated bibliography.

Index.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Security for ubiquitous computing, * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-establi, Security for ubiquitous computing

X
WonderClub Home

This item is in your Collection

Security for ubiquitous computing, * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-establi, Security for ubiquitous computing

Security for ubiquitous computing

X
WonderClub Home

This Item is in Your Inventory

Security for ubiquitous computing, * Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-establi, Security for ubiquitous computing

Security for ubiquitous computing

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: