The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security for Ubiquitous Computing
Abstract
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.
Related Content
Maja Pucelj, Matjaž Mulej, Anita Hrast.
© 2024.
29 pages.
|
Hemendra Singh.
© 2024.
26 pages.
|
Nestor Soler del Toro.
© 2024.
27 pages.
|
Pablo Banchio.
© 2024.
18 pages.
|
Jože Ruparčič.
© 2024.
26 pages.
|
Anuttama Ghose, Hartej Singh Kochher, S. M. Aamir Ali.
© 2024.
28 pages.
|
Bhupinder Singh, Komal Vig, Pushan Kumar Dutta, Christian Kaunert, Bhupendra Kumar Gautam.
© 2024.
23 pages.
|
|
|