Bibliographic record and links to related information available from the Library of Congress catalog
Information from electronic data provided by the publisher. May be incomplete or contain other coding.
1. Introduction. Scenario. Essential terminology. Problems. Notation. 2. Ubiquitous computing. Xerox PARC. Norman's Invisible Computer. MIT. HP's Cooltown. ORL/AT&T Labs Cambridge. Security issues. 3. Computer security. Confidentiality. Integrity. Availability. Authentication. Security policies. 4. Authentication. New preconditions. The Resurrecting Duckling security policy model. The many ways of being a master. 5. Confidentiality. Cryptographic primitives for peanut processors. Personal privacy. 6. Integrity. Message integrity. Device integrity. 7. Availability. Threats to the communications channel. Threats to the battery energy. Threats from mobile code. 8. Anonymity. The Cocaine Auction Protocol. The anonymity layer. 9. Conclusions. Appendices. Annotated bibliography. Index.