رکورد قبلیرکورد بعدی

" Security for ubiquitous computing "


Document Type : BL
Record Number : 733934
Doc. No : b553758
Main Entry : Frank Stajano.
Title & Author : Security for ubiquitous computing\ Frank Stajano.
Publication Statement : Chichester: John Wiley & Sons, ©2002.
Series Statement : Wiley series in communications networking & distributed systems.
Page. NO : XIX, 247 p. : il. ; 25 cm
ISBN : 0470844930
: : 9780470844939
Contents : About the Author. Forward. Preface. Acknowledgements. Contact Information. 1. Introduction. Scenario. Essential terminology. Problems. Notation. 2. Ubiquitous computing. Xerox PARC. Normana s Invisible Computer. MIT. HPa s Cooltown. ORL/AT&T Labs Cambridge. Security issues. 3. Computer security. Confidentiality. Integrity. Availability. Authentication. Security policies. 4. Authentication. New preconditions. The Resurrecting Duckling security policy model. The many ways of being a master. 5. Confidentiality. Cryptographic primitives for peanut processors. Personal privacy. 6. Integrity. Message integrity. Device integrity. 7. Availability. Threats to the communications channel. Threats to the battery energy. Threats from mobile code. 8. Anonymity. The Cocaine Auction Protocol. The anonymity layer. 9. Conclusions. Appendix A: A Short Primer on Functions. Appendix B: Existing Network Security Solutions. Annotated bibliography. Index.
Subject : Ordinadors, Xarxes d' -- Mesures de seguretat.
Added Entry : Frank Stajano
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟