Wiley.com
Print this page Share

Security for Ubiquitous Computing

ISBN: 978-0-470-84493-9
Hardcover
268 pages
March 2002
List Price: US $144.50
Government Price: US $83.16
Enter Quantity:   Buy
Security for Ubiquitous Computing  (0470844930) cover image
This is a Print-on-Demand title. It will be printed specifically to fill your order. Please allow an additional 10-15 days delivery time. The book is not returnable.

About the Author.

Forward.

Preface.

Acknowledgements.

Contact Information.

1. Introduction.

Scenario.

Essential terminology.

Problems.

Notation.

2. Ubiquitous computing.

Xerox PARC.

Norman's Invisible Computer.

MIT.

HP's Cooltown.

ORL/AT&T Labs Cambridge.

Security issues.

3. Computer security.

Confidentiality.

Integrity.

Availability.

Authentication.

Security policies.

4. Authentication.

New preconditions.

The Resurrecting Duckling security policy model.

The many ways of being a master.

5. Confidentiality.

Cryptographic primitives for peanut processors.

Personal privacy.

6. Integrity.

Message integrity.

Device integrity.

7. Availability.

Threats to the communications channel.

Threats to the battery energy.

Threats from mobile code.

8. Anonymity.

The Cocaine Auction Protocol.

The anonymity layer.

9. Conclusions.

Appendix A: A Short Primer on Functions.

Appendix B: Existing Network Security Solutions.


Annotated bibliography.

Index.

Related Titles

More From This Series

by Martin Jacobsson, Ignas Niemegeers, Sonia Heemstra de Groot
by Gonzalo Gómez Herrero, Jan Antón Bernal van der Ven
by Alexandros Stavdas
by Zach Shelby, Carsten Bormann

Networks

by Georgios I. Papadimitriou, Andreas S. Pomportsis, P. Nicopolitidis, Mohammed S. Obaidat
Back to Top