rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780387256580

Security And Privacy in the Age of Ubiquitous Computing

by ; ;
  • ISBN13:

    9780387256580

  • ISBN10:

    038725658X

  • Format: Hardcover
  • Copyright: 2005-06-30
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $229.99

Summary

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Table of Contents

Security for Multimedia
Digital Signature Schemes
Intrusion Detection
Internet and Web Security
Mobility and Ubiquitous Security
Secure Commercial Systems
Trusted Computing Systems
Accountable Anonymous E-Mail
Protecting Consumer Data in Composite Web Services
Enhancing Security in ERP Systems
Architecture for User Authentication and Key Exchange
A Secure Quantum Communication Protocol Using Insecure Public Channels
Mathematical Models of IP Traceback Methods
Secure Human Communications Based on Biometrics Signals
Designated-Verifier Proxy Signature Schemes
Signcryption in Hierarchical Identity Based Cryptosystem
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program