Security for wireless sensor networks using identity-based cryptography [electronic resource] / Harsh Kupwade Patil, Stephen A. Szygenda.
Material type: TextPublication details: Boca Raton, Fla. : CRC Press, 2013.Description: xix, 209 p. : illISBN:- 9781439869024 (ebook : PDF)
- Also available in print edition.
"An Auerbach book."
Includes bibliographical references and index.
ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks.
Also available in print edition.
Mode of access: World Wide Web.
There are no comments on this title.