|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1228513014 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
160813s2012 xx eo 000 0 eng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCO
|d COO
|d CDX
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 817931731
|
020 |
|
|
|a 9781439869024
|
020 |
|
|
|a 1439869022
|
020 |
|
|
|a 9781439869017
|
020 |
|
|
|a 1439869014
|
024 |
8 |
|
|a KE74843
|
024 |
8 |
|
|a 9781439869024
|
029 |
1 |
|
|a AU@
|b 000067829949
|
035 |
|
|
|a (OCoLC)1228513014
|z (OCoLC)817931731
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Patil, Harsh,
|e author.
|
245 |
1 |
0 |
|a Security for Wireless Sensor Networks using Identity-Based Cryptography /
|c Patil, Harsh.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Auerbach Publications,
|c 2012.
|
300 |
|
|
|a 1 online resource (232 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 59.95
|
520 |
|
|
|a Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft.
|
542 |
|
|
|f Copyright © Auerbach Publications 2013
|g 2013
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed October 18, 2012).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Wireless sensor networks.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Réseaux de capteurs sans fil.
|
650 |
|
7 |
|a Wireless sensor networks
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Szygenda, Stephen,
|e author.
|
700 |
1 |
|
|a Szygenda, Stephen A.
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
1 |
|
|z 9781439869017
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439869024/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 26428759
|
994 |
|
|
|a 92
|b IZTAP
|