Cargando…

Security for Wireless Sensor Networks using Identity-Based Cryptography /

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Patil, Harsh (Autor), Szygenda, Stephen (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Otros Autores: Szygenda, Stephen A.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Auerbach Publications, 2012.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1228513014
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 160813s2012 xx eo 000 0 eng d
040 |a TOH  |b eng  |c TOH  |d OCLCO  |d COO  |d CDX  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 817931731 
020 |a 9781439869024 
020 |a 1439869022 
020 |a 9781439869017 
020 |a 1439869014 
024 8 |a KE74843 
024 8 |a 9781439869024 
029 1 |a AU@  |b 000067829949 
035 |a (OCoLC)1228513014  |z (OCoLC)817931731 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Patil, Harsh,  |e author. 
245 1 0 |a Security for Wireless Sensor Networks using Identity-Based Cryptography /  |c Patil, Harsh. 
250 |a 1st edition. 
264 1 |a [Place of publication not identified] :  |b Auerbach Publications,  |c 2012. 
300 |a 1 online resource (232 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 59.95 
520 |a Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft. 
542 |f Copyright © Auerbach Publications 2013  |g 2013 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title page (viewed October 18, 2012). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cryptography. 
650 0 |a Wireless sensor networks. 
650 6 |a Sécurité informatique. 
650 6 |a Cryptographie. 
650 6 |a Réseaux de capteurs sans fil. 
650 7 |a Wireless sensor networks  |2 fast 
650 7 |a Cryptography  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Szygenda, Stephen,  |e author. 
700 1 |a Szygenda, Stephen A. 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
776 1 |z 9781439869017 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439869024/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 26428759 
994 |a 92  |b IZTAP