Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
Secure Protocols for Location, Adjacency, and Identity Verification
Details
In the virtual world of networked electronic services, finding the physical location of a device, or determining the properties of the link between two devices, might be as important as knowing their identities. Consider, for example, a sensor whose role is counting traffic at some location, or the link between a proximity card and its reader. Moreover, since there is no compulsion to believe a device (called prover), its location should be independently computable, possibly by its neighbors (called verifiers). The goal of this work is to develop a set of techniques for merging the concepts of identity authentication with either location authentication or adjacency authentication into a single peer-to-peer protocol.
Autorentext
Arun Saha is a senior member of technical staff at Fujitsu Network Communications, Sunnyvale. He works on security and accuracy in wireless localization and carrier ethernet switching. Arun holds a B.S. from Jadavpur University and Ph.D. from University of California, Riverside. Besides work, Arun indulges in puzzles, movies, and bridge.
Weitere Informationen
- Allgemeine Informationen
- GTIN 09783843385060
- Anzahl Seiten 248
- Genre Allgemein & Lexika
- Herausgeber LAP LAMBERT Academic Publishing
- Gewicht 387g
- Untertitel Cross Layer Techniques
- Größe H220mm x B150mm x T15mm
- Jahr 2011
- EAN 9783843385060
- Format Kartonierter Einband
- ISBN 3843385068
- Veröffentlichung 21.01.2011
- Titel Secure Protocols for Location, Adjacency, and Identity Verification
- Autor Arun Saha
- Sprache Englisch