rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780470844939

Security for Ubiquitous Computing

by
  • ISBN13:

    9780470844939

  • ISBN10:

    0470844930

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2002-03-22
  • Publisher: WILEY
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $138.61 Save up to $0.14
  • Buy New
    $138.47
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Summary

* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks * Focuses on two very hot topics: ad-hoc wireless networking and security * Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP * Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions * Includes a primer on security and the basics of cryptography * Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

Author Biography

Frank Stajano is a faculty member in the Department of Engineering of the University of Cambridge (United Kingdom), where he holds the ARM Lectureship in Ubiquitous Computing Systems at the Laboratory for Communications Engineering

Table of Contents

About the Author.
Forward.
Preface.
Acknowledgements.
Contact Information.
1. Introduction.
Scenario.
Essential terminology.
Problems.
Notation.
2. Ubiquitous computing.
Xerox PARC.
Norman's Invisible Computer.
MIT.
HP's Cooltown.
ORL/AT&T Labs Cambridge.
Security issues.
3. Computer security.
Confidentiality.
Integrity.
Availability.
Authentication.
Security policies.
4. Authentication.
New preconditions.
The Resurrecting Duckling security policy model.
The many ways of being a master.
5. Confidentiality.
Cryptographic primitives for peanut processors.
Personal privacy.
6. Integrity.
Message integrity.
Device integrity.
7. Availability.
Threats to the communications channel.
Threats to the battery energy.
Threats from mobile code.
8. Anonymity.
The Cocaine Auction Protocol.
The anonymity layer.
9. Conclusions.
Appendix A: A Short Primer on Functions.
Appendix B: Existing Network Security Solutions.
Annotated bibliography.
Index

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program