Books on the topic 'Ubiquitous Computing Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Ubiquitous Computing Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Avoine, Gildas, and Julio Hernandez-Castro, eds. Security of Ubiquitous Computing Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4.
Full textJeyanthi, N., Ajith Abraham, and Hamid Mcheick, eds. Ubiquitous Computing and Computing Security of IoT. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.
Full textTeddy, Mantoro, and SpringerLink (Online service), eds. Trustworthy Ubiquitous Computing. Atlantis Press, 2012.
Find full textMahalle, Parikshit N., Gitanjali R. Shinde, Nilanjan Dey, and Aboul Ella Hassanien, eds. Security Issues and Privacy Threats in Smart Ubiquitous Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4996-4.
Full textSasaki, Ryoichi, Sihan Qing, Eiji Okamoto, and Hiroshi Yoshiura, eds. Security and Privacy in the Age of Ubiquitous Computing. Springer US, 2005. http://dx.doi.org/10.1007/b135818.
Full textSauveron, Damien, Konstantinos Markantonakis, Angelos Bilas, and Jean-Jacques Quisquater, eds. Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72354-7.
Full textInternational, Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing (2nd 2006 Lyon France). SecPerU 2006: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France. IEEE Computer Society, 2006.
Find full textInternational Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (3rd 2007 Istanbul, Turkey). Proceedings: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey. Edited by Georgiadis P and IEEE Computer Society. IEEE Computer Society, 2007.
Find full textIEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2006 Tʻai-chung shih, Taiwan). IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing: Proceedings : June 5-7, 2006, Taichung, Taiwan. IEEE, 2006.
Find full textIFIP TC11 International Information Security Conference (20th 2005 Chiba, Japan). Security and privacy in the age of ubiquitous computing: IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan. Springer, 2005.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Tibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. Chisik Kyŏngjebu, 2008.
Find full textButtyán, Levente. Security and cooperation in wireless networks: Thwarting malicious and selfish behavior in the age of ubiquitous computing. Cambridge University Press, 2008.
Find full textWISTP 2007 (2007 Hērakleion, Greece). Information security theory and practices: Smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings. Springer, 2007.
Find full textIyengar, S. S. (Sundararaja S.) and Phoha Vir V, eds. Introduction to contextual processing: Theory and applications. Chapman and Hall/CRC, 2011.
Find full textIFIP TC11 International Information Security Conference (22nd 2007 Sandton, South Africa). New approaches for security, privacy and trust in complex environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. Springer, 2007.
Find full text1974-, Lacour Stéphanie, and Asphalès (Research program), eds. La sécurité de l'individu numérisé: Réflexions prospectives et internationales : actes de colloque, Paris, 22 et 23 novembre 2007. Harmattan, 2008.
Find full textArdagna, Claudio A. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. IFIP International Federation for Information Processing, 2011.
Find full textXiaoming, Zhang, and SpringerLink (Online service), eds. Internet of Things: International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textStajano, Frank. Security for Ubiquitous Computing. Wiley & Sons Australia, Limited, John, 2002.
Find full textStajano, F. Security for Ubiquitous Computing. Wiley & Sons, Incorporated, John, 2002.
Find full textAvoine, Gildas, and Julio Hernandez-Castro. Security of Ubiquitous Computing Systems. Springer, 2021.
Find full textAbraham, Ajith, N. Jeyanthi, and Hamid Mcheick. Ubiquitous Computing and Computing Security of IoT. Springer, 2019.
Find full textIntelligent Ubiquitous Computing: Applications and Security Issues. Emerald Publishing Limited, 2009.
Find full textMahalle, Parikshit N., and Gitanjali Rahul Shinde. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.
Find full textShinde, Gitanjali Rahul, and Parikshit Narendra Mahalle. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.
Find full textShinde, Gitanjali Rahul, and Parikshit Narendra Mahalle. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.
Find full textMahalle, Parikshit N., and Gitanjali Rahul Shinde. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.
Find full textShinde, Gitanjali Rahul, and Parikshit Narendra Mahalle. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.
Find full textHassanien, Aboul Ella, Nilanjan Dey, Parikshit N. Mahalle, and Gitanjali R. Shinde. Security Issues and Privacy Threats in Smart Ubiquitous Computing. Springer Singapore Pte. Limited, 2022.
Find full textHassanien, Aboul Ella, Nilanjan Dey, Parikshit N. Mahalle, and Gitanjali R. Shinde. Security Issues and Privacy Threats in Smart Ubiquitous Computing. Springer Singapore Pte. Limited, 2021.
Find full textMacaulay, Tyson, Phyllis Schneck, and Greg Brown. RIOT Control: Understanding and Managing Risks and the Internet of Things. Elsevier Science & Technology Books, 2016.
Find full textMacaulay, Tyson. RIoT Control: Understanding and Managing Risks and the Internet of Things. Elsevier Science & Technology Books, 2016.
Find full textAhamed, Sheikh Iqbal, and Munirul Hague. Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications. Taylor & Francis Group, 2023.
Find full textPrivacy, Security and Trust within the Context of Pervasive Computing. Springer, 2006.
Find full textPrivacy, security, and trust within the context of pervasive computing. Springer, 2004.
Find full textRobinson, Philip, Harald Vogt, and Waleed Wagealla. Privacy, Security and Trust within the Context of Pervasive Computing. Springer, 2010.
Find full textAbie, Habtamu, and Mohamed Hamdi. Adaptive Security for the Internet of Things: Research, Standards, and Practices. Elsevier Science & Technology Books, 2015.
Find full text(Editor), Dieter Hutter, and Markus Ullmann (Editor), eds. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science). Springer, 2005.
Find full textRoßnagel, Alexander, Klaus David, Ludger Schmidt, Jan Marco Leimeister, and Kurt Geihs. Socio-Technical Design of Ubiquitous Computing Systems. Springer, 2014.
Find full textInformation Security Theory And Practice Security Privacy And Trust In Computing Systems And Ambient Intelligent Ecosystems 6th Ifip Wg 112 International Workshop Wistp 2012 Egham Uk June 2022 2012 Proceedings. Springer, 2012.
Find full textSociety, IEEE Computer. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing: Proceedings: June 5-7, 2006, Taichung, Taiwan. Institute of Electrical & Electronics Enginee, 2006.
Find full textUllmann, Markus, Werner Stephan, Dieter Hutter, and Günter Müller. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Springer London, Limited, 2004.
Find full text(Editor), Ryoichi Sasaki, Sihan Qing (Editor), Eiji Okamoto (Editor), and Hiroshi Yoshiura (Editor), eds. Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan ... Federation for Information Processing). Springer, 2005.
Find full textUllmann, Markus, and Dieter Hutter. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings. Springer London, Limited, 2005.
Find full textTibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. Chisik Kyŏngjebu, 2008.
Find full textHubaux, Jean-Pierre, and Levente Buttyán. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, 2009.
Find full text