Cargando…

Security in Wireless Sensor Networks

This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Oreku, George S. (Autor), Pazynyuk, Tamara (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2016.
Edición:1st ed. 2016.
Colección:Risk Engineering,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-21269-2
003 DE-He213
005 20220120034859.0
007 cr nn 008mamaa
008 150912s2016 sz | s |||| 0|eng d
020 |a 9783319212692  |9 978-3-319-21269-2 
024 7 |a 10.1007/978-3-319-21269-2  |2 doi 
050 4 |a TK5101-5105.9 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
072 7 |a TJK  |2 thema 
082 0 4 |a 621.382  |2 23 
100 1 |a Oreku, George S.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Security in Wireless Sensor Networks  |h [electronic resource] /  |c by George S. Oreku, Tamara Pazynyuk. 
250 |a 1st ed. 2016. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2016. 
300 |a XVII, 87 p. 20 illus., 7 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Risk Engineering,  |x 2195-4348 
505 0 |a Introduction and Overview -- QoS as Means of Providing WSN Security -- Mathematical Model for Wireless Sensor Nodes Security -- Improved Feistel-based Ciphers for Wireless Sensor Network Security -- The Distributed Signature Scheme (DSS) Based on RSA -- Reliable Data Aggregation Protocol for Wireless Sensor Networks -- Conclusions and Future Work. 
520 |a This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students. 
650 0 |a Telecommunication. 
650 0 |a Computer science-Mathematics. 
650 0 |a Computer networks . 
650 0 |a Graph theory. 
650 0 |a Security systems. 
650 1 4 |a Communications Engineering, Networks. 
650 2 4 |a Mathematical Applications in Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Graph Theory. 
650 2 4 |a Security Science and Technology. 
700 1 |a Pazynyuk, Tamara.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319212685 
776 0 8 |i Printed edition:  |z 9783319212708 
776 0 8 |i Printed edition:  |z 9783319373140 
830 0 |a Risk Engineering,  |x 2195-4348 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-21269-2  |z Texto Completo 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
950 |a Engineering (SpringerNature-11647) 
950 |a Engineering (R0) (SpringerNature-43712)