IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security for Ubiquitous Computing

Security for Ubiquitous Computing
View Sample PDF
Author(s): Tobias Straub (Fraunhofer Institute for Secure Information Technology, Germany)and Andreas Heinemann (Technical University of Darmstadt, Germany)
Copyright: 2009
Pages: 27
Source title: Human Computer Interaction: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Chee Siang Ang (City University of London, UK)and Panayiotis Zaphiris (City University of London, UK)
DOI: 10.4018/978-1-87828-991-9.ch026

Purchase

View Security for Ubiquitous Computing on the publisher's website for pricing and purchasing information.

Abstract

Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.

Related Content

Harish Chandra Verma, Saurabh Srivastava. © 2025. 12 pages.
Lingala Thirupathi, B. Vasundara, Dheeraj Sundaragiri, Vijaya Bhaskar Ch, Ravi Gugulothu, Radhika Pulyala. © 2025. 26 pages.
Mohd Saleem, Rajeev Kumar, Chanchal Chawla, Mahendra Singh. © 2025. 14 pages.
Nobhonil Roy Choudhury, Shyamalendu Paul. © 2025. 22 pages.
Abhay Bhatia, Anil Kumar, Devendra Sood. © 2025. 32 pages.
Aparna Datta, Akash Mondal, Arunima Sarkar. © 2025. 16 pages.
Adrija Das, Pratyasha Nanda, Ritika Jain, Tanisha Saini, Sneha Bhaskar, Hitesh Mohapatra. © 2025. 18 pages.
Body Bottom