000 03024nam a22006015i 4500
001 978-3-319-21269-2
003 DE-He213
005 20220801221846.0
007 cr nn 008mamaa
008 150912s2016 sz | s |||| 0|eng d
020 _a9783319212692
_9978-3-319-21269-2
024 7 _a10.1007/978-3-319-21269-2
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aOreku, George S.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_958392
245 1 0 _aSecurity in Wireless Sensor Networks
_h[electronic resource] /
_cby George S. Oreku, Tamara Pazynyuk.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXVII, 87 p. 20 illus., 7 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aRisk Engineering,
_x2195-4348
505 0 _aIntroduction and Overview -- QoS as Means of Providing WSN Security -- Mathematical Model for Wireless Sensor Nodes Security -- Improved Feistel-based Ciphers for Wireless Sensor Network Security -- The Distributed Signature Scheme (DSS) Based on RSA -- Reliable Data Aggregation Protocol for Wireless Sensor Networks -- Conclusions and Future Work.
520 _aThis monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.
650 0 _aTelecommunication.
_910437
650 0 _aComputer science—Mathematics.
_931682
650 0 _aComputer networks .
_931572
650 0 _aGraph theory.
_93662
650 0 _aSecurity systems.
_931879
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aMathematical Applications in Computer Science.
_931683
650 2 4 _aComputer Communication Networks.
_958393
650 2 4 _aGraph Theory.
_93662
650 2 4 _aSecurity Science and Technology.
_931884
700 1 _aPazynyuk, Tamara.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_958394
710 2 _aSpringerLink (Online service)
_958395
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319212685
776 0 8 _iPrinted edition:
_z9783319212708
776 0 8 _iPrinted edition:
_z9783319373140
830 0 _aRisk Engineering,
_x2195-4348
_958396
856 4 0 _uhttps://doi.org/10.1007/978-3-319-21269-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80132
_d80132