000 | 03024nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-319-21269-2 | ||
003 | DE-He213 | ||
005 | 20220801221846.0 | ||
007 | cr nn 008mamaa | ||
008 | 150912s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319212692 _9978-3-319-21269-2 |
||
024 | 7 |
_a10.1007/978-3-319-21269-2 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aOreku, George S. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _958392 |
|
245 | 1 | 0 |
_aSecurity in Wireless Sensor Networks _h[electronic resource] / _cby George S. Oreku, Tamara Pazynyuk. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXVII, 87 p. 20 illus., 7 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aRisk Engineering, _x2195-4348 |
|
505 | 0 | _aIntroduction and Overview -- QoS as Means of Providing WSN Security -- Mathematical Model for Wireless Sensor Nodes Security -- Improved Feistel-based Ciphers for Wireless Sensor Network Security -- The Distributed Signature Scheme (DSS) Based on RSA -- Reliable Data Aggregation Protocol for Wireless Sensor Networks -- Conclusions and Future Work. | |
520 | _aThis monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aComputer science—Mathematics. _931682 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aGraph theory. _93662 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aMathematical Applications in Computer Science. _931683 |
650 | 2 | 4 |
_aComputer Communication Networks. _958393 |
650 | 2 | 4 |
_aGraph Theory. _93662 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
700 | 1 |
_aPazynyuk, Tamara. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _958394 |
|
710 | 2 |
_aSpringerLink (Online service) _958395 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319212685 |
776 | 0 | 8 |
_iPrinted edition: _z9783319212708 |
776 | 0 | 8 |
_iPrinted edition: _z9783319373140 |
830 | 0 |
_aRisk Engineering, _x2195-4348 _958396 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-21269-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c80132 _d80132 |