Limit search to available items
Book Cover
Book
Author Stajano, Frank.

Title Security for ubiquitous computing / Frank Stajano
Published West Sussex, England, New York :. J. Wiley & Sons, [2002]
©2002

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Sta/Sfu  AVAILABLE
 W'PONDS  005.8 Sta/Sfu  AVAILABLE
 W'PONDS  005.8 Sta/Sfu  AVAILABLE
 MELB  005.8 Sta/Sfu  AVAILABLE
 MELB  005.8 Sta/Sfu  AVAILABLE
Description xix, 247 pages : illustrations ; 25 cm
Series Wiley series in communications networking & distributed systems
Wiley series in communications networking & distributed systems.
Contents 1. Introduction -- 2. Ubiquitous computing -- 3. Computer security -- 4. Authentication -- 5. Confidentiality -- 6. Integrity -- 7. Availability -- 8. Anonymity -- 9. Conclusions -- A. A short primer on functions -- B. Existing network security solutions
Summary Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine. The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake. Features include: * An introduction to the state of the art in ubicomp research. * A readable primer on security and cryptology. * An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11. * "Peer-to-peer" and ad-hoc networking. * An in-depth discussion of specific, cutting-edge solutions. * An extensively annotated bibliography. Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.
Bibliography Includes bibliographical references (pages 204-243) and index
Subject Computer networks -- Security measures.
LC no. 2001055938
ISBN 0470844930 alkaline paper