To see the other types of publications on this topic, follow the link: Ubiquitous Computing Security.

Books on the topic 'Ubiquitous Computing Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Ubiquitous Computing Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Avoine, Gildas, and Julio Hernandez-Castro, eds. Security of Ubiquitous Computing Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeyanthi, N., Ajith Abraham, and Hamid Mcheick, eds. Ubiquitous Computing and Computing Security of IoT. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teddy, Mantoro, and SpringerLink (Online service), eds. Trustworthy Ubiquitous Computing. Atlantis Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mahalle, Parikshit N., Gitanjali R. Shinde, Nilanjan Dey, and Aboul Ella Hassanien, eds. Security Issues and Privacy Threats in Smart Ubiquitous Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4996-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sasaki, Ryoichi, Sihan Qing, Eiji Okamoto, and Hiroshi Yoshiura, eds. Security and Privacy in the Age of Ubiquitous Computing. Springer US, 2005. http://dx.doi.org/10.1007/b135818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sauveron, Damien, Konstantinos Markantonakis, Angelos Bilas, and Jean-Jacques Quisquater, eds. Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72354-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

International, Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing (2nd 2006 Lyon France). SecPerU 2006: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France. IEEE Computer Society, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (3rd 2007 Istanbul, Turkey). Proceedings: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey. Edited by Georgiadis P and IEEE Computer Society. IEEE Computer Society, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2006 Tʻai-chung shih, Taiwan). IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing: Proceedings : June 5-7, 2006, Taichung, Taiwan. IEEE, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

IFIP TC11 International Information Security Conference (20th 2005 Chiba, Japan). Security and privacy in the age of ubiquitous computing: IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Tibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Buttyán, Levente. Security and cooperation in wireless networks: Thwarting malicious and selfish behavior in the age of ubiquitous computing. Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

WISTP 2007 (2007 Hērakleion, Greece). Information security theory and practices: Smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Iyengar, S. S. (Sundararaja S.) and Phoha Vir V, eds. Introduction to contextual processing: Theory and applications. Chapman and Hall/CRC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

IFIP TC11 International Information Security Conference (22nd 2007 Sandton, South Africa). New approaches for security, privacy and trust in complex environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

1974-, Lacour Stéphanie, and Asphalès (Research program), eds. La sécurité de l'individu numérisé: Réflexions prospectives et internationales : actes de colloque, Paris, 22 et 23 novembre 2007. Harmattan, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ardagna, Claudio A. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. IFIP International Federation for Information Processing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Xiaoming, Zhang, and SpringerLink (Online service), eds. Internet of Things: International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Stajano, Frank. Security for Ubiquitous Computing. Wiley & Sons Australia, Limited, John, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Stajano, F. Security for Ubiquitous Computing. Wiley & Sons, Incorporated, John, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Security for Ubiquitous Computing. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Trustworthy Ubiquitous Computing. Atlantis Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Avoine, Gildas, and Julio Hernandez-Castro. Security of Ubiquitous Computing Systems. Springer, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ubiquitous Computing and Computing Security of IoT. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Abraham, Ajith, N. Jeyanthi, and Hamid Mcheick. Ubiquitous Computing and Computing Security of IoT. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Intelligent Ubiquitous Computing: Applications and Security Issues. Emerald Publishing Limited, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mahalle, Parikshit N., and Gitanjali Rahul Shinde. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Shinde, Gitanjali Rahul, and Parikshit Narendra Mahalle. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Shinde, Gitanjali Rahul, and Parikshit Narendra Mahalle. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mahalle, Parikshit N., and Gitanjali Rahul Shinde. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shinde, Gitanjali Rahul, and Parikshit Narendra Mahalle. Security Issues and Privacy Threats in Ubiquitous Computing. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hassanien, Aboul Ella, Nilanjan Dey, Parikshit N. Mahalle, and Gitanjali R. Shinde. Security Issues and Privacy Threats in Smart Ubiquitous Computing. Springer Singapore Pte. Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hassanien, Aboul Ella, Nilanjan Dey, Parikshit N. Mahalle, and Gitanjali R. Shinde. Security Issues and Privacy Threats in Smart Ubiquitous Computing. Springer Singapore Pte. Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Macaulay, Tyson, Phyllis Schneck, and Greg Brown. RIOT Control: Understanding and Managing Risks and the Internet of Things. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Macaulay, Tyson. RIoT Control: Understanding and Managing Risks and the Internet of Things. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ahamed, Sheikh Iqbal, and Munirul Hague. Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Privacy, Security and Trust within the Context of Pervasive Computing. Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Privacy, security, and trust within the context of pervasive computing. Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Robinson, Philip, Harald Vogt, and Waleed Wagealla. Privacy, Security and Trust within the Context of Pervasive Computing. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Abie, Habtamu, and Mohamed Hamdi. Adaptive Security for the Internet of Things: Research, Standards, and Practices. Elsevier Science & Technology Books, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

(Editor), Dieter Hutter, and Markus Ullmann (Editor), eds. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Lecture Notes in Computer Science). Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Socio-Technical Design of Ubiquitous Computing Systems. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Roßnagel, Alexander, Klaus David, Ludger Schmidt, Jan Marco Leimeister, and Kurt Geihs. Socio-Technical Design of Ubiquitous Computing Systems. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Information Security Theory And Practice Security Privacy And Trust In Computing Systems And Ambient Intelligent Ecosystems 6th Ifip Wg 112 International Workshop Wistp 2012 Egham Uk June 2022 2012 Proceedings. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Society, IEEE Computer. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing: Proceedings: June 5-7, 2006, Taichung, Taiwan. Institute of Electrical & Electronics Enginee, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ullmann, Markus, Werner Stephan, Dieter Hutter, and Günter Müller. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Springer London, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

(Editor), Ryoichi Sasaki, Sihan Qing (Editor), Eiji Okamoto (Editor), and Hiroshi Yoshiura (Editor), eds. Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan ... Federation for Information Processing). Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ullmann, Markus, and Dieter Hutter. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings. Springer London, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Tibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hubaux, Jean-Pierre, and Levente Buttyán. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!