Security and Privacy in the Age of Ubiquitous Computing

Security and Privacy in the Age of Ubiquitous Computing

4.11 - 1251 ratings - Source

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.THE PAIRING PROBLEM WITH USER INTERACTION Thomas Peyrirt EPFL Lausanne. Switzerland ... Abstract Bluetooth-like applications face the pairing problem: two devices want to establish a relationship between them without any prior private information. ... The low bandwidth channel can be a (passive) human user who can read a PIN code on one device and write it on the other in a secure way. XX.

Title:Security and Privacy in the Age of Ubiquitous Computing
Author: Ryoichi Sasaki
Publisher:Springer Science & Business Media - 2005-05-19

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA