|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-46781-8 |
003 |
DE-He213 |
005 |
20220116110358.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387467818
|9 978-0-387-46781-8
|
024 |
7 |
|
|a 10.1007/978-0-387-46781-8
|2 doi
|
050 |
|
4 |
|a TK5101-5105.9
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Liu, Donggang.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Security for Wireless Sensor Networks
|h [electronic resource] /
|c by Donggang Liu, Peng Ning.
|
250 |
|
|
|a 1st ed. 2007.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2007.
|
300 |
|
|
|a XII, 212 p. 83 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 2512-2193 ;
|v 28
|
505 |
0 |
|
|a Broadcast Authentication -- Pairwise Key Establishment -- Improving Pairwise Key Establishment Using Deployment Knowledge -- Secure Localization -- Summary and Future Work.
|
520 |
|
|
|a Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Coding theory.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Ning, Peng.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441940988
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387512525
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387327235
|
830 |
|
0 |
|a Advances in Information Security,
|x 2512-2193 ;
|v 28
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-46781-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|