000 | 01813nam a2200349Ia 4500 | ||
---|---|---|---|
001 | AUP0KE13299PDF | ||
003 | FlBoTFG | ||
005 | 20171224123832.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr|||| | ||
008 | 121126s2013 fluad sb 001 0 eng d | ||
020 | _a9781439869024 (ebook : PDF) | ||
040 |
_aFlBoTFG _cFlBoTFG |
||
090 |
_aQA76.9.A25 _bP38 2013 |
||
092 |
_a005.8 _bP298 |
||
100 | 1 | _aPatil, Harsh Kupwade. | |
245 | 1 | 0 |
_aSecurity for wireless sensor networks using identity-based cryptography _h[electronic resource] / _cHarsh Kupwade Patil, Stephen A. Szygenda. |
260 |
_aBoca Raton, Fla. : _bCRC Press, _c2013. |
||
300 |
_axix, 209 p. : _bill. |
||
500 | _a"An Auerbach book." | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _ach. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks. | |
530 | _aAlso available in print edition. | ||
538 | _aMode of access: World Wide Web. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aWireless sensor networks. | |
650 | 0 | _aCryptography. | |
655 | 7 |
_aElectronic books. _2lcsh |
|
700 | 1 | _aSzygenda, Stephen A. | |
776 | 1 | _z9781439869017 (hardback) | |
856 | 4 | 0 |
_uhttp://marc.crcnetbase.com/isbn/9781439869024 _qapplication/PDF _zDistributed by publisher. Purchase or institutional license may be required for access. |
999 |
_c15845 _d15845 |