Items related to Security in resource constrained devices: Secure protocols...

Security in resource constrained devices: Secure protocols for resource constrained devices - Softcover

 
9783836480970: Security in resource constrained devices: Secure protocols for resource constrained devices
View all copies of this ISBN edition:
 
 
The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads.

"synopsis" may belong to another edition of this title.

  • PublisherVDM Verlag Dr. Müller
  • Publication date2010
  • ISBN 10 3836480972
  • ISBN 13 9783836480970
  • BindingPaperback
  • Number of pages136

Top Search Results from the AbeBooks Marketplace

Stock Image

Spognardi, Angelo
Published by VDM Verlag Dr. Müller (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New Softcover Quantity: > 20
Seller:
Lucky's Textbooks
(Dallas, TX, U.S.A.)

Book Description Condition: New. Seller Inventory # ABLING22Oct2817100588668

More information about this seller | Contact seller

Buy New
US$ 75.85
Convert currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, rates & speeds
Stock Image

Angelo Spognardi
Published by VDM Verlag (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New Softcover Quantity: > 20
Print on Demand
Seller:
Ria Christie Collections
(Uxbridge, United Kingdom)

Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9783836480970_lsuk

More information about this seller | Contact seller

Buy New
US$ 67.68
Convert currency

Add to Basket

Shipping: US$ 12.48
From United Kingdom to U.S.A.
Destination, rates & speeds
Stock Image

Spognardi, Angelo
Published by VDM Verlag 2010-03 (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New PF Quantity: 10
Seller:
Chiron Media
(Wallingford, United Kingdom)

Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9783836480970

More information about this seller | Contact seller

Buy New
US$ 63.19
Convert currency

Add to Basket

Shipping: US$ 18.75
From United Kingdom to U.S.A.
Destination, rates & speeds
Seller Image

Angelo Spognardi
Published by VDM Verlag Dr. Müller (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New Taschenbuch Quantity: 2
Print on Demand
Seller:
BuchWeltWeit Ludwig Meier e.K.
(Bergisch Gladbach, Germany)

Book Description Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads. 136 pp. Englisch. Seller Inventory # 9783836480970

More information about this seller | Contact seller

Buy New
US$ 65.19
Convert currency

Add to Basket

Shipping: US$ 24.67
From Germany to U.S.A.
Destination, rates & speeds
Stock Image

Spognardi, Angelo
Published by VDM Verlag Dr. Müller (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New PAP Quantity: > 20
Print on Demand
Seller:
PBShop.store US
(Wood Dale, IL, U.S.A.)

Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783836480970

More information about this seller | Contact seller

Buy New
US$ 92.87
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds
Seller Image

Angelo Spognardi
Published by VDM Verlag Dr. Müller (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New Taschenbuch Quantity: 2
Print on Demand
Seller:
AHA-BUCH GmbH
(Einbeck, Germany)

Book Description Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads. Seller Inventory # 9783836480970

More information about this seller | Contact seller

Buy New
US$ 65.97
Convert currency

Add to Basket

Shipping: US$ 35.39
From Germany to U.S.A.
Destination, rates & speeds
Stock Image

Spognardi, Angelo
Published by VDM Verlag Dr. Müller (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New PAP Quantity: > 20
Print on Demand
Seller:
PBShop.store UK
(Fairford, GLOS, United Kingdom)

Book Description PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783836480970

More information about this seller | Contact seller

Buy New
US$ 70.37
Convert currency

Add to Basket

Shipping: US$ 31.27
From United Kingdom to U.S.A.
Destination, rates & speeds
Seller Image

Angelo Spognardi
Published by VDM Verlag Dr. Müller (2010)
ISBN 10: 3836480972 ISBN 13: 9783836480970
New Kartoniert / Broschiert Quantity: > 20
Seller:
moluna
(Greven, Germany)

Book Description Kartoniert / Broschiert. Condition: New. Seller Inventory # 5388454

More information about this seller | Contact seller

Buy New
US$ 51.18
Convert currency

Add to Basket

Shipping: US$ 52.55
From Germany to U.S.A.
Destination, rates & speeds