000 01813nam a2200349Ia 4500
001 AUP0KE13299PDF
003 FlBoTFG
005 20171224123832.0
006 m|||||o||d||||||||
007 cr||||
008 121126s2013 fluad sb 001 0 eng d
020 _a9781439869024 (ebook : PDF)
040 _aFlBoTFG
_cFlBoTFG
090 _aQA76.9.A25
_bP38 2013
092 _a005.8
_bP298
100 1 _aPatil, Harsh Kupwade.
245 1 0 _aSecurity for wireless sensor networks using identity-based cryptography
_h[electronic resource] /
_cHarsh Kupwade Patil, Stephen A. Szygenda.
260 _aBoca Raton, Fla. :
_bCRC Press,
_c2013.
300 _axix, 209 p. :
_bill.
500 _a"An Auerbach book."
504 _aIncludes bibliographical references and index.
505 0 _ach. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks.
530 _aAlso available in print edition.
538 _aMode of access: World Wide Web.
650 0 _aComputer security.
650 0 _aWireless sensor networks.
650 0 _aCryptography.
655 7 _aElectronic books.
_2lcsh
700 1 _aSzygenda, Stephen A.
776 1 _z9781439869017 (hardback)
856 4 0 _uhttp://marc.crcnetbase.com/isbn/9781439869024
_qapplication/PDF
_zDistributed by publisher. Purchase or institutional license may be required for access.
999 _c15845
_d15845