SKU/Artículo: AMZ-3836480972

Security in resource constrained devices: Secure protocols for resource constrained devices

Format:

Paperback

Detalles del producto
Disponibilidad:
En stock
Peso con empaque:
0.39 kg
Devolución:
Condición
Nuevo
Producto de:
Amazon
Viaja desde
USA

Sobre este producto
  • The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads.
U$S 156,00
49% OFF
U$S 80,00

IMPORTÁ FACIL

Comprando este producto podrás descontar el IVA con tu número de RUT

NO CONSUME FRANQUICIA

Si tu carrito tiene solo libros o CD’s, no consume franquicia y podés comprar hasta U$S 1000 al año.

U$S 156,00
49% OFF
U$S 80,00

¡Comprá en hasta 12 cuotas sin interés con todas tus tarjetas!

Llega en 5 a 11 días hábiles
con envío
Tienes garantía de entrega