|
|
|
|
LEADER |
02922nam a22005655i 4500 |
001 |
978-0-387-46781-8 |
003 |
DE-He213 |
005 |
20151204150814.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387467818
|9 978-0-387-46781-8
|
024 |
7 |
|
|a 10.1007/978-0-387-46781-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Liu, Donggang.
|e author.
|
245 |
1 |
0 |
|a Security for Wireless Sensor Networks
|h [electronic resource] /
|c by Donggang Liu, Peng Ning.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2007.
|
300 |
|
|
|a XII, 212 p. 83 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 28
|
505 |
0 |
|
|a Broadcast Authentication -- Pairwise Key Establishment -- Improving Pairwise Key Establishment Using Deployment Knowledge -- Secure Localization -- Summary and Future Work.
|
520 |
|
|
|a Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Ning, Peng.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387327235
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 28
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-46781-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|