51,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
26 °P sammeln
  • Broschiertes Buch

In the virtual world of networked electronic services, finding the physical location of a device, or determining the properties of the link between two devices, might be as important as knowing their identities. Consider, for example, a sensor whose role is counting traffic at some location, or the link between a proximity card and its reader. Moreover, since there is no compulsion to believe a device (called prover), its location should be independently computable, possibly by its neighbors (called verifiers). The goal of this work is to develop a set of techniques for merging the concepts of…mehr

Produktbeschreibung
In the virtual world of networked electronic services, finding the physical location of a device, or determining the properties of the link between two devices, might be as important as knowing their identities. Consider, for example, a sensor whose role is counting traffic at some location, or the link between a proximity card and its reader. Moreover, since there is no compulsion to believe a device (called prover), its location should be independently computable, possibly by its neighbors (called verifiers). The goal of this work is to develop a set of techniques for merging the concepts of identity authentication with either location authentication or adjacency authentication into a single peer-to-peer protocol.
Autorenporträt
Arun Saha is a senior member of technical staff at Fujitsu Network Communications, Sunnyvale. He works on security and accuracy in wireless localization and carrier ethernet switching. Arun holds a B.S. from Jadavpur University and Ph.D. from University of California, Riverside. Besides work, Arun indulges in puzzles, movies, and bridge.