|
|
|
|
LEADER |
03487nam a2200505 4500 |
001 |
978-3-030-20816-5 |
003 |
DE-He213 |
005 |
20191022112502.0 |
007 |
cr nn 008mamaa |
008 |
190611s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030208165
|9 978-3-030-20816-5
|
024 |
7 |
|
|a 10.1007/978-3-030-20816-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5103.2-.4885
|
072 |
|
7 |
|a TJKW
|2 bicssc
|
072 |
|
7 |
|a TEC061000
|2 bisacsh
|
072 |
|
7 |
|a TJKW
|2 thema
|
082 |
0 |
4 |
|a 384.5
|2 23
|
100 |
1 |
|
|a Shankar, K.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Secure Image Transmission in Wireless Sensor Network (WSN) Applications
|h [electronic resource] /
|c by K. Shankar, Mohamed Elhoseny.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a X, 161 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 564
|
505 |
0 |
|
|a Introduction -- An Optimal Light Weight Cryptography - SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks.
|
520 |
|
|
|a This book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a "must-read" guide to the subject matter.
|
650 |
|
0 |
|a Wireless communication systems.
|
650 |
|
0 |
|a Mobile communication systems.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
1 |
4 |
|a Wireless and Mobile Communication.
|0 http://scigraph.springernature.com/things/product-market-codes/T24100
|
650 |
2 |
4 |
|a Computational Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/T11014
|
700 |
1 |
|
|a Elhoseny, Mohamed.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030208158
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030208172
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030208189
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 564
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-20816-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|