Security for Ubiquitous Computing

Author:   Frank Stajano (University of Cambridge, UK)
Publisher:   John Wiley & Sons Inc
Edition:   annotated edition
ISBN:  

9780470844939


Pages:   272
Publication Date:   12 February 2002
Format:   Hardback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $203.95 Quantity:  
Add to Cart

Share |

Security for Ubiquitous Computing


Add your own review!

Overview

* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks * Focuses on two very hot topics: ad-hoc wireless networking and security * Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP * Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions * Includes a primer on security and the basics of cryptography * Describes the security issues in ""peer-to-peer networking,"" a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

Full Product Details

Author:   Frank Stajano (University of Cambridge, UK)
Publisher:   John Wiley & Sons Inc
Imprint:   John Wiley & Sons Inc
Edition:   annotated edition
Dimensions:   Width: 17.60cm , Height: 2.00cm , Length: 24.90cm
Weight:   0.624kg
ISBN:  

9780470844939


ISBN 10:   0470844930
Pages:   272
Publication Date:   12 February 2002
Audience:   Professional and scholarly ,  Professional and scholarly ,  General/trade ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

About the Author. Forward. Preface. Acknowledgements. Contact Information. 1. Introduction. Scenario. Essential terminology. Problems. Notation. 2. Ubiquitous computing. Xerox PARC. Norman's Invisible Computer. MIT. HP's Cooltown. ORL/AT&T Labs Cambridge. Security issues. 3. Computer security. Confidentiality. Integrity. Availability. Authentication. Security policies. 4. Authentication. New preconditions. The Resurrecting Duckling security policy model. The many ways of being a master. 5. Confidentiality. Cryptographic primitives for peanut processors. Personal privacy. 6. Integrity. Message integrity. Device integrity. 7. Availability. Threats to the communications channel. Threats to the battery energy. Threats from mobile code. 8. Anonymity. The Cocaine Auction Protocol. The anonymity layer. 9. Conclusions. Appendix A: A Short Primer on Functions. Appendix B: Existing Network Security Solutions. Annotated bibliography. Index.

Reviews

...a remarkably readable introduction to the topic...rich in background material. (IEEE Network, New Books & Multimedia Column, November 2002)


""...a remarkably readable introduction to the topic...rich in background material."" (IEEE Network, New Books & Multimedia Column, November 2002)


Author Information

Frank Stajano is the author of Security for Ubiquitous Computing , published by Wiley.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List