Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptographic security solutions for...
~
Banday, Mohammad Tariq, (1969-)
Cryptographic security solutions for the internet of things
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cryptographic security solutions for the internet of thingsMohammad Tariq Banday, editor.
other author:
Banday, Mohammad Tariq,
Published:
Hershey, Pennsylvania :IGI Global,[2019]
Description:
25 PDFs (xxiv, 367 p.)
Subject:
Internet of thingsSecurity measures.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5
ISBN:
9781522557432 (e-book)
Cryptographic security solutions for the internet of things
Cryptographic security solutions for the internet of things
[electronic resource] /Mohammad Tariq Banday, editor. - Hershey, Pennsylvania :IGI Global,[2019] - 25 PDFs (xxiv, 367 p.)
Includes bibliographical references and index.
Section 1. Introduction. Chapter 1. Security in context of the internet of things: a study -- Section 2. Encryption and cryptography. Chapter 2. Encryption principles and techniques for the internet of things ; Chapter 3. A review of cryptographic algorithms for the internet of things -- Section 3. Security protocols. Chapter 4. Addressing security issues of the internet of things using physically unclonable functions ; Chapter 5. Hardware primitives-based security protocols for the internet of things ; Chapter 6. Secure computation of private set intersection cardinality with linear complexity ; Chapter 7. A secure gateway discovery protocol using elliptic curve cryptography for internet-integrated MANET ; Chapter 8. Preserving security of mobile anchors against physical layer attacks: a resilient scheme for wireless Node localization ; Chapter 9. An adaptive security framework for the internet of things applications based on the contextual information -- Section 4. Social/legal issues and forensics. Chapter 10. Emerging social and legal issues of the internet of things: a case study ; Chapter 11. Digital forensics in the context of the internet of things.
Restricted to subscribers or individual electronic text purchasers.
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--Provided by publisher.
ISBN: 9781522557432 (e-book)Subjects--Topical Terms:
770009
Internet of things
--Security measures.
LC Class. No.: TK5102.94 / .C77 2019e
Dewey Class. No.: 005.8/24
Cryptographic security solutions for the internet of things
LDR
:02470nmm a2200277 a 4500
001
560108
003
IGIG
005
20191023143710.0
006
m o d
007
cr cn
008
200109s2019 pau fob 001 0 eng d
010
$z
2017055701
020
$a
9781522557432 (e-book)
020
$a
9781522557425 (hardback)
035
$a
(OCoLC)1083671389
035
$a
1081021254
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5102.94
$b
.C77 2019e
082
0 0
$a
005.8/24
$2
23
245
0 0
$a
Cryptographic security solutions for the internet of things
$h
[electronic resource] /
$c
Mohammad Tariq Banday, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
25 PDFs (xxiv, 367 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Introduction. Chapter 1. Security in context of the internet of things: a study -- Section 2. Encryption and cryptography. Chapter 2. Encryption principles and techniques for the internet of things ; Chapter 3. A review of cryptographic algorithms for the internet of things -- Section 3. Security protocols. Chapter 4. Addressing security issues of the internet of things using physically unclonable functions ; Chapter 5. Hardware primitives-based security protocols for the internet of things ; Chapter 6. Secure computation of private set intersection cardinality with linear complexity ; Chapter 7. A secure gateway discovery protocol using elliptic curve cryptography for internet-integrated MANET ; Chapter 8. Preserving security of mobile anchors against physical layer attacks: a resilient scheme for wireless Node localization ; Chapter 9. An adaptive security framework for the internet of things applications based on the contextual information -- Section 4. Social/legal issues and forensics. Chapter 10. Emerging social and legal issues of the internet of things: a case study ; Chapter 11. Digital forensics in the context of the internet of things.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--Provided by publisher.
650
0
$a
Internet of things
$x
Security measures.
$3
770009
650
0
$a
Cryptography.
$3
189522
700
1
$a
Banday, Mohammad Tariq,
$d
1969-
$e
editor.
$3
843710
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000172179
電子館藏
1圖書
電子書
EB TK5102.94 .C77 2019 [2019]
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login