Cantitate/Preț
Produs

Security in Pervasive Computing

Editat de Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann
en Limba Engleză Paperback – 26 ian 2004

Preț: 34297 lei

Preț vechi: 42872 lei
-20% Nou

Puncte Express: 514

Preț estimativ în valută:
6068 7080$ 5305£

Carte tipărită la comandă

Livrare economică 12-19 ianuarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540208877
ISBN-10: 3540208879
Pagini: 308
Ilustrații: XII, 296 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.47 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Invited Talks (Abstracts).- The Age of Pervasive Computing – Everything Smart, Everything Connected?.- Cyber Assist Project and Its Security Requirement.- Security in Pervasive Computing.- The Importance of High Assurance Security in Pervasive Computing.- Location Privacy.- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks.- Protecting Access to People Location Information.- Security Requirements.- Smart Devices and Software Agents: The Basics of Good Behaviour.- Dependability Issues of Pervasive Computing in a Healthcare Environment.- Security Policies and Protection.- Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.- Enforcing Security Policies via Types.- Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems.- Authentication and Trust.- Authentication for Pervasive Computing.- End-to-End Trust Starts with Recognition.- Embedding Distance-Bounding Protocols within Intuitive Interactions.- Secure Infrastructures.- Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments.- Time Constraint Delegation for P2P Data Decryption.- SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.- Smart Labels.- Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.- Verification.- Implementing a Formally Verifiable Security Protocol in Java Card.- Hardware Architectures.- Cellular Automata Based Multiplier for Public-Key Cryptosystem.- Enlisting Hardware Architecture to Thwart Malicious Code Injection.- Optimized RISC Architecture for Multiple-Precision Modular Arithmetic.- Visual Crypto Displays Enabling Secure Communications.- Workshop.- Security and Privacy in Pervasive Computing State of the Artand Future Directions.

Caracteristici

Includes supplementary material: sn.pub/extras