|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn824133749 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
130114s2012 ne ob 000 0 eng d |
010 |
|
|
|a 2012951489
|
040 |
|
|
|a IOSPR
|b eng
|e pn
|c IOSPR
|d N$T
|d E7B
|d YDXCP
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d AZK
|d LOA
|d COCUF
|d AGLDB
|d MOR
|d PIFAG
|d OCLCQ
|d JBG
|d U3W
|d OCLCF
|d STF
|d WRM
|d VTS
|d NRAMU
|d INT
|d VT2
|d OCLCQ
|d WYU
|d TKN
|d OCLCQ
|d M8D
|d HS0
|d OCLCQ
|d OCLCO
|d OCLCQ
|d QGK
|d OCLCO
|
019 |
|
|
|a 961659782
|a 962655015
|a 1055392803
|a 1065913298
|a 1081207647
|a 1228549057
|a 1259217642
|a 1281712742
|a 1286906422
|
020 |
|
|
|a 9781614991571
|q (electronic bk.)
|
020 |
|
|
|a 161499157X
|q (electronic bk.)
|
020 |
|
|
|a 1614991561
|
020 |
|
|
|a 9781614991564
|
020 |
|
|
|z 9781614991564
|
020 |
|
|
|a 1283920301
|
020 |
|
|
|a 9781283920308
|
029 |
1 |
|
|a AU@
|b 000050608233
|
029 |
1 |
|
|a DEBBG
|b BV043121484
|
029 |
1 |
|
|a DEBSZ
|b 421279761
|
029 |
1 |
|
|a NZ1
|b 15344656
|
035 |
|
|
|a (OCoLC)824133749
|z (OCoLC)961659782
|z (OCoLC)962655015
|z (OCoLC)1055392803
|z (OCoLC)1065913298
|z (OCoLC)1081207647
|z (OCoLC)1228549057
|z (OCoLC)1259217642
|z (OCoLC)1281712742
|z (OCoLC)1286906422
|
037 |
|
|
|a 9781614991571
|b IOS Press
|n http://www.iospress.nl
|
050 |
|
4 |
|a QA76.5915
|b .W43 2012
|
072 |
|
7 |
|a COM
|x COM014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Weber, Stefan G.
|
245 |
1 |
0 |
|a Multilaterally secure pervasive cooperation :
|b privacy protection, accountability and secure communication for the age of pervasive computing /
|c Stefan G. Weber.
|
260 |
|
|
|a Amsterdam ;
|a Washington, D.C. :
|b IOS Press,
|c ©2012.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cryptology and information security series ;
|v v. 9
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Title page of PDF; (IOS Press; viewed on Jan. 14, 2013).
|
505 |
0 |
|
|a Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System
|
505 |
8 |
|
|a Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario
|
505 |
8 |
|
|a Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives
|
505 |
8 |
|
|a Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles
|
505 |
8 |
|
|a Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Ubiquitous computing
|x Security measures.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
6 |
|a Informatique omniprésente
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
710 |
2 |
|
|a IOS Press.
|
776 |
0 |
8 |
|i Print version:
|a Weber, Stefan G.
|t Multilaterally secure pervasive cooperation.
|d Amsterdam ; Washington, D.C. : IOS Press, ©2012
|w (DLC) 2012951489
|
830 |
|
0 |
|a Cryptology and information security series ;
|v v. 9.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=529563
|z Texto completo
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10641750
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 529563
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9961235
|
994 |
|
|
|a 92
|b IZTAP
|