"synopsis" may belong to another edition of this title.
Shipping:
US$ 3.99
Within U.S.A.
Book Description Condition: New. Seller Inventory # ABLING22Oct2817100588668
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9783836480970_lsuk
Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9783836480970
Book Description Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads. 136 pp. Englisch. Seller Inventory # 9783836480970
Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783836480970
Book Description Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads. Seller Inventory # 9783836480970
Book Description PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783836480970
Book Description Kartoniert / Broschiert. Condition: New. Seller Inventory # 5388454