語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cryptographic security solutions for...
~
Banday, Mohammad Tariq, (1969-)
Cryptographic security solutions for the internet of things
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cryptographic security solutions for the internet of thingsMohammad Tariq Banday, editor.
其他作者:
Banday, Mohammad Tariq,
出版者:
Hershey, Pennsylvania :IGI Global,[2019]
面頁冊數:
25 PDFs (xxiv, 367 p.)
標題:
Internet of thingsSecurity measures.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5
ISBN:
9781522557432 (e-book)
Cryptographic security solutions for the internet of things
Cryptographic security solutions for the internet of things
[electronic resource] /Mohammad Tariq Banday, editor. - Hershey, Pennsylvania :IGI Global,[2019] - 25 PDFs (xxiv, 367 p.)
Includes bibliographical references and index.
Section 1. Introduction. Chapter 1. Security in context of the internet of things: a study -- Section 2. Encryption and cryptography. Chapter 2. Encryption principles and techniques for the internet of things ; Chapter 3. A review of cryptographic algorithms for the internet of things -- Section 3. Security protocols. Chapter 4. Addressing security issues of the internet of things using physically unclonable functions ; Chapter 5. Hardware primitives-based security protocols for the internet of things ; Chapter 6. Secure computation of private set intersection cardinality with linear complexity ; Chapter 7. A secure gateway discovery protocol using elliptic curve cryptography for internet-integrated MANET ; Chapter 8. Preserving security of mobile anchors against physical layer attacks: a resilient scheme for wireless Node localization ; Chapter 9. An adaptive security framework for the internet of things applications based on the contextual information -- Section 4. Social/legal issues and forensics. Chapter 10. Emerging social and legal issues of the internet of things: a case study ; Chapter 11. Digital forensics in the context of the internet of things.
Restricted to subscribers or individual electronic text purchasers.
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--Provided by publisher.
ISBN: 9781522557432 (e-book)Subjects--Topical Terms:
770009
Internet of things
--Security measures.
LC Class. No.: TK5102.94 / .C77 2019e
Dewey Class. No.: 005.8/24
Cryptographic security solutions for the internet of things
LDR
:02470nmm a2200277 a 4500
001
560108
003
IGIG
005
20191023143710.0
006
m o d
007
cr cn
008
200109s2019 pau fob 001 0 eng d
010
$z
2017055701
020
$a
9781522557432 (e-book)
020
$a
9781522557425 (hardback)
035
$a
(OCoLC)1083671389
035
$a
1081021254
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5102.94
$b
.C77 2019e
082
0 0
$a
005.8/24
$2
23
245
0 0
$a
Cryptographic security solutions for the internet of things
$h
[electronic resource] /
$c
Mohammad Tariq Banday, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
25 PDFs (xxiv, 367 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Introduction. Chapter 1. Security in context of the internet of things: a study -- Section 2. Encryption and cryptography. Chapter 2. Encryption principles and techniques for the internet of things ; Chapter 3. A review of cryptographic algorithms for the internet of things -- Section 3. Security protocols. Chapter 4. Addressing security issues of the internet of things using physically unclonable functions ; Chapter 5. Hardware primitives-based security protocols for the internet of things ; Chapter 6. Secure computation of private set intersection cardinality with linear complexity ; Chapter 7. A secure gateway discovery protocol using elliptic curve cryptography for internet-integrated MANET ; Chapter 8. Preserving security of mobile anchors against physical layer attacks: a resilient scheme for wireless Node localization ; Chapter 9. An adaptive security framework for the internet of things applications based on the contextual information -- Section 4. Social/legal issues and forensics. Chapter 10. Emerging social and legal issues of the internet of things: a case study ; Chapter 11. Digital forensics in the context of the internet of things.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--Provided by publisher.
650
0
$a
Internet of things
$x
Security measures.
$3
770009
650
0
$a
Cryptography.
$3
189522
700
1
$a
Banday, Mohammad Tariq,
$d
1969-
$e
editor.
$3
843710
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000172179
電子館藏
1圖書
電子書
EB TK5102.94 .C77 2019 [2019]
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入