MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn694792705
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 110103s2009 nyua ob 001 0 eng d
010 |a  2008012769 
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCO  |d E7B  |d OCLCQ  |d NLGGC  |d OCLCO  |d EBLCP  |d OCLCO  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d MERUC  |d AGLDB  |d ZCU  |d OCLCQ  |d U3W  |d OCLCF  |d OCLCO  |d STF  |d WRM  |d VTS  |d COCUF  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d OCLCO  |d WYU  |d OCLCQ  |d OCLCO  |d DKC  |d OCLCQ  |d AU@  |d M8D  |d OCLCQ  |d OCLCO  |d UKCRE  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBA878743  |2 bnb 
016 7 |a 014647787  |2 Uk 
019 |a 923659770  |a 961657460  |a 962652135  |a 988539321  |a 1037942044  |a 1038644928  |a 1045496236  |a 1055367975  |a 1059036570  |a 1065696314  |a 1081226718  |a 1097159297  |a 1152974212  |a 1153545869  |a 1228569699 
020 |a 9781612097329  |q (electronic bk.) 
020 |a 1612097324  |q (electronic bk.) 
020 |z 9781604564570 
020 |z 1604564571 
020 |z 9781604564580 
020 |z 160456458X 
020 |z 9781604564587 
029 1 |a AU@  |b 000051365744 
029 1 |a DEBBG  |b BV043136652 
029 1 |a DEBBG  |b BV044087935 
029 1 |a DEBSZ  |b 421647779 
029 1 |a DEBSZ  |b 449539806 
029 1 |a DEBSZ  |b 45491718X 
029 1 |a GBVCP  |b 80344821X 
029 1 |a NZ1  |b 15346006 
035 |a (OCoLC)694792705  |z (OCoLC)923659770  |z (OCoLC)961657460  |z (OCoLC)962652135  |z (OCoLC)988539321  |z (OCoLC)1037942044  |z (OCoLC)1038644928  |z (OCoLC)1045496236  |z (OCoLC)1055367975  |z (OCoLC)1059036570  |z (OCoLC)1065696314  |z (OCoLC)1081226718  |z (OCoLC)1097159297  |z (OCoLC)1152974212  |z (OCoLC)1153545869  |z (OCoLC)1228569699 
050 4 |a TK7872.D48  |b F76 2009eb 
072 7 |a TEC  |x 064000  |2 bisacsh 
082 0 4 |a 681/.25  |2 22 
049 |a UAMI 
245 0 0 |a From problem toward solution :  |b wireless sensor networks security /  |c Zhen Jiang and Yi Pan, editors. 
260 |a New York :  |b Nova Science Publishers,  |c ©2009. 
300 |a 1 online resource (xii, 382 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Distributed, cluster and grid computing 
504 |a Includes bibliographical references and index. 
505 0 |a Preserving data authenticity in wireless sensor networks: attacks and countermeasures / Fan Ye [and others] -- Location tracking attack in ad hoc networks based on topology information / Boto Bako [and others] -- Prevention of DOS attack in sensor networks using repeated game theory / Afrand Agah, Mehran Asadi and Sajal K. Das -- Impact of packet injection models on misbehavior detection performance in wireless sensor networks / Sven Schaust, Martin Drozda and Helena Szczerbicka -- Security aware routing in hierarchical optical sensor networks / Unoma Ndili Okorafor and Deepa Kundur -- Secure multi-path data delivery in sensor networks / Dijiang Huang -- SELOC: secure localization for wireless sensor and actor network / Jianqing Ma, Shiyong Zhang and Xiaowen Tong -- Security in wireless sensor networks: a formal approach / Llanos Tobarra, Diego Cazorlas and Fernando Cuartero -- C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks / Qi Jing, Joanbin Hu and Zhong Chen -- Energy consumption of security algorithms in wireless sensor nodes / Chih-Chun Chang, David J. Nagel and Sead Muftic -- Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions / Effie Makri and Yannis C. Stamatiou -- ARPD: asynchronous random key predistribution in the leap framework for wireless sensor networks / Andreas Achtzehn, Christian Rohner and Ionna Rodhe -- Secure k-connectivity properties of wireless sensor networks / Yee Wei Law [and others] -- Gateway subset difference revocation / Jeffrey Opper, Brian DeCleene and May Leung -- Authenticated key exchange with group support for wireless sensor networks / Petr Švenda and Václav Matyáš -- Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 beacon enabled clusters Jelena Mišić -- Secure access control for location-based applications in WLAN systems / YounSun Cho, Michael Goodrich and Lichun Bao -- Practical user access control in sensor networks / HaodongWang and Qun Li. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Sensor networks  |x Security measures. 
650 0 |a Wireless LANs  |x Security measures. 
650 0 |a Wireless metropolitan area networks  |x Security measures. 
650 0 |a Ad hoc networks (Computer networks)  |x Security measures. 
650 6 |a Réseaux de capteurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux locaux sans fil  |x Sécurité  |x Mesures. 
650 6 |a Réseaux métropolitains sans fil (Informatique)  |x Sécurité  |x Mesures. 
650 6 |a Réseaux ad hoc (Réseaux d'ordinateurs)  |x Sécurité  |x Mesures. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Sensors.  |2 bisacsh 
650 7 |a Wireless LANs  |x Security measures  |2 fast 
700 1 |a Jiang, Zhen. 
700 1 |a Pan, Yi,  |d 1960-  |1 https://id.oclc.org/worldcat/entity/E39PCjvMmd3fPyGgp8QW78HPV3 
758 |i has work:  |a From problem toward solution (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH7RpQH8yPFJfcCDrCmQtq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t From problem toward solution.  |d New York : Nova Science Publishers, ©2009  |z 9781604564570  |w (DLC) 2008012769  |w (OCoLC)213445794 
830 0 |a Distributed, cluster, and grid computing. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3018991  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3018991 
938 |a ebrary  |b EBRY  |n ebr10662797 
938 |a EBSCOhost  |b EBSC  |n 350622 
938 |a YBP Library Services  |b YANK  |n 3589249 
994 |a 92  |b IZTAP