Wiley series in communications networking & distributed systems.
یادداشتهای مربوط به مندرجات
متن يادداشت
About the Author. Forward. Preface. Acknowledgements. Contact Information. 1. Introduction. Scenario. Essential terminology. Problems. Notation. 2. Ubiquitous computing. Xerox PARC. Normana s Invisible Computer. MIT. HPa s Cooltown. ORL/AT&T Labs Cambridge. Security issues. 3. Computer security. Confidentiality. Integrity. Availability. Authentication. Security policies. 4. Authentication. New preconditions. The Resurrecting Duckling security policy model. The many ways of being a master. 5. Confidentiality. Cryptographic primitives for peanut processors. Personal privacy. 6. Integrity. Message integrity. Device integrity. 7. Availability. Threats to the communications channel. Threats to the battery energy. Threats from mobile code. 8. Anonymity. The Cocaine Auction Protocol. The anonymity layer. 9. Conclusions. Appendix A: A Short Primer on Functions. Appendix B: Existing Network Security Solutions. Annotated bibliography. Index.
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Ordinadors, Xarxes d' -- Mesures de seguretat.
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )