CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Security for wireless sensor networks using identity-based cryptography (Record no. 15845)

MARC details
000 -LEADER
fixed length control field 01813nam a2200349Ia 4500
001 - CONTROL NUMBER
control field AUP0KE13299PDF
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171224123832.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m|||||o||d||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121126s2013 fluad sb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439869024 (ebook : PDF)
040 ## - CATALOGING SOURCE
Original cataloging agency FlBoTFG
Transcribing agency FlBoTFG
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.A25
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) P38 2013
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Classification number 005.8
Item number P298
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Patil, Harsh Kupwade.
245 10 - TITLE STATEMENT
Title Security for wireless sensor networks using identity-based cryptography
Medium [electronic resource] /
Statement of responsibility, etc Harsh Kupwade Patil, Stephen A. Szygenda.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton, Fla. :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2013.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 209 p. :
Other physical details ill.
500 ## - GENERAL NOTE
General note "An Auerbach book."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print edition.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless sensor networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Szygenda, Stephen A.
776 1# - ADDITIONAL PHYSICAL FORM ENTRY
International Standard Book Number 9781439869017 (hardback)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://marc.crcnetbase.com/isbn/9781439869024">http://marc.crcnetbase.com/isbn/9781439869024</a>
Electronic format type application/PDF
Public note Distributed by publisher. Purchase or institutional license may be required for access.

No items available.


Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh