語系:
繁體中文
English
簡体中文
說明(常見問題)
登入
網路辦證
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security for wireless sensor networks using identity-based cryptography
紀錄類型:
書目-電子資源 : 單行本
作者:
PatilHarsh Kupwade,
合作者:
SzygendaStephen A.,
出版地:
Boca Raton, FL
出版者:
CRC Press;
出版年:
2012
面頁冊數:
1 online resource (xix, 204 p.)
標題:
Data encryption (Computer science) -
標題:
Public key cryptography -
標題:
Computers - Access control -
標題:
Computer security -
電子資源:
http://www.crcnetbase.com/isbn/9781439869024
附註:
Print version record
ISBN:
9781439869024electronic bk.
ISBN:
1439869022electronic bk.
內容註:
Ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks
Security for wireless sensor networks using identity-based cryptography
Patil, Harsh Kupwade
Security for wireless sensor networks using identity-based cryptography
/ Harsh Kupwade Patil, Stephen A. Szygenda - Boca Raton, FL : CRC Press, 2012. - 1 online resource (xix, 204 p.).
Ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks.
Print version record.
Includes bibliographical references and index.
ISBN 9781439869024ISBN 1439869022
Data encryption (Computer science)Public key cryptographyComputersComputer security -- Access control
Szygenda, Stephen A.
Security for wireless sensor networks using identity-based cryptography
LDR
:01378clm0 2200265 4500
001
311133
005
20151105041455.0
009
ocn815659938
010
1
$a
9781439869024
$b
electronic bk.
010
1
$a
1439869022
$b
electronic bk.
010
1
$z
9781439869017
010
1
$z
1439869014
100
$a
20160112d2012 k y0engy01 b
101
0
$a
eng
102
$a
us
$b
fl
105
$a
y a 001yy
200
1
$a
Security for wireless sensor networks using identity-based cryptography
$f
Harsh Kupwade Patil, Stephen A. Szygenda
204
1
$a
electronic resource
210
$a
Boca Raton, FL
$d
2012
$c
CRC Press
215
1
$a
1 online resource (xix, 204 p.)
300
$a
Print version record
320
$a
Includes bibliographical references and index
327
1
$a
Ch. 1. Introduction to wireless sensor networks -- ch. 2. Security in wireless sensor networks -- ch. 3. Elliptic curve cryptography -- ch. 4. Identity-based cryptography -- ch. 5. Identity-based authentication and encryption in wireless sensor networks -- ch. 6. Identity-based key distribution in wireless sensor networks -- ch. 7. Routing in wireless sensor networks using identity-based cryptography -- ch. 8. Cross-layer security in wireless sensor networks -- ch. 9. Implementation of elliptic curve cryptography in wireless sensor networks
606
$a
Data encryption (Computer science)
$3
131184
606
$a
Public key cryptography
$2
lc
$3
372251
606
$a
Computers
$x
Access control
$2
lc
$3
371155
606
$a
Computer security
$2
lc
$3
271676
676
$a
005.8
$v
23
680
$a
QA76.9.A25
700
1
$a
Patil
$b
Harsh Kupwade
$3
372249
701
1
$a
Szygenda
$b
Stephen A.
$3
372250
856
4 0
$u
http://www.crcnetbase.com/isbn/9781439869024
筆 0 讀者評論
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入