Security in Pervasive Computing
Editat de Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmannen Limba Engleză Paperback – 26 ian 2004
Preț: 342.97 lei
Preț vechi: 428.72 lei
-20% Nou
Puncte Express: 514
Preț estimativ în valută:
60.68€ • 70.80$ • 53.05£
60.68€ • 70.80$ • 53.05£
Carte tipărită la comandă
Livrare economică 12-19 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540208877
ISBN-10: 3540208879
Pagini: 308
Ilustrații: XII, 296 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.47 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540208879
Pagini: 308
Ilustrații: XII, 296 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.47 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks (Abstracts).- The Age of Pervasive Computing – Everything Smart, Everything Connected?.- Cyber Assist Project and Its Security Requirement.- Security in Pervasive Computing.- The Importance of High Assurance Security in Pervasive Computing.- Location Privacy.- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks.- Protecting Access to People Location Information.- Security Requirements.- Smart Devices and Software Agents: The Basics of Good Behaviour.- Dependability Issues of Pervasive Computing in a Healthcare Environment.- Security Policies and Protection.- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.- Enforcing Security Policies via Types.- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems.- Authentication and Trust.- Authentication for Pervasive Computing.- End-to-End Trust Starts with Recognition.- Embedding Distance-Bounding Protocols within Intuitive Interactions.- Secure Infrastructures.- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments.- Time Constraint Delegation for P2P Data Decryption.- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.- Smart Labels.- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.- Verification.- Implementing a Formally Verifiable Security Protocol in Java Card.- Hardware Architectures.- Cellular Automata Based Multiplier for Public-Key Cryptosystem.- Enlisting Hardware Architecture to Thwart Malicious Code Injection.- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic.- Visual Crypto Displays Enabling Secure Communications.- Workshop.- Security and Privacy in Pervasive Computing State of the Artand Future Directions.
Caracteristici
Includes supplementary material: sn.pub/extras