Wiley.com
Print this page Share

Security for Ubiquitous Computing

ISBN: 978-0-470-84493-9
Hardcover
268 pages
February 2002
List Price: US $115.00
Government Price: US $83.16
Enter Quantity:   Buy
Security for Ubiquitous Computing  (0470844930) cover image

About the Author.

Forward.

Preface.

Acknowledgements.

Contact Information.

1. Introduction.

Scenario.

Essential terminology.

Problems.

Notation.

2. Ubiquitous computing.

Xerox PARC.

Norman's Invisible Computer.

MIT.

HP's Cooltown.

ORL/AT&T Labs Cambridge.

Security issues.

3. Computer security.

Confidentiality.

Integrity.

Availability.

Authentication.

Security policies.

4. Authentication.

New preconditions.

The Resurrecting Duckling security policy model.

The many ways of being a master.

5. Confidentiality.

Cryptographic primitives for peanut processors.

Personal privacy.

6. Integrity.

Message integrity.

Device integrity.

7. Availability.

Threats to the communications channel.

Threats to the battery energy.

Threats from mobile code.

8. Anonymity.

The Cocaine Auction Protocol.

The anonymity layer.

9. Conclusions.

Appendix A: A Short Primer on Functions.

Appendix B: Existing Network Security Solutions.


Annotated bibliography.

Index.

Related Titles

More From This Series

by Martin Jacobsson, Ignas Niemegeers, Sonia Heemstra de Groot
by Gonzalo Gómez Herrero, Jan Antón Bernal van der Ven
by Alexandros Stavdas
by Zach Shelby, Carsten Bormann

Networks

by Georgios I. Papadimitriou, Andreas S. Pomportsis, P. Nicopolitidis, Mohammed S. Obaidat
Back to Top