Security for wireless sensor networks using identity-based cryptography
Patil, Harsh Kupwade.
Security for wireless sensor networks using identity-based cryptography [electronic resource] / Harsh Kupwade Patil, Stephen A. Szygenda. - Boca Raton, Fla. : CRC Press, 2013. - xix, 209 p. : ill.
"An Auerbach book."
Includes bibliographical references and index.
ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks.
Mode of access: World Wide Web.
9781439869024 (ebook : PDF)
Computer security.
Wireless sensor networks.
Cryptography.
Electronic books.
Security for wireless sensor networks using identity-based cryptography [electronic resource] / Harsh Kupwade Patil, Stephen A. Szygenda. - Boca Raton, Fla. : CRC Press, 2013. - xix, 209 p. : ill.
"An Auerbach book."
Includes bibliographical references and index.
ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks.
Mode of access: World Wide Web.
9781439869024 (ebook : PDF)
Computer security.
Wireless sensor networks.
Cryptography.
Electronic books.