Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209796 | ||
003 | DE-604 | ||
005 | 20160701 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 xx a||| o|||| 00||| eng d | ||
020 | |a 9781493934607 |c Online |9 978-1-4939-3460-7 | ||
024 | 7 | |a 10.1007/978-1-4939-3460-7 |2 doi | |
035 | |a (OCoLC)932033200 | ||
035 | |a (DE-599)BVBBV043209796 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 004.6 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
100 | 1 | |a Conti, Mauro |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure Wireless Sensor Networks |b Threats and Solutions |c Mauro Conti ; foreword by Luigi Vincenzo Mancini |
264 | 1 | |a New York, NY |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 169 Seiten) |b 50 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security |v 65 |x 1568-2633 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4939-3458-4 |
830 | 0 | |a Advances in Information Security |v 65 |w (DE-604)BV022281064 |9 65 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4939-3460-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028632957 | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-UBR_katkey | 6740552 |
---|---|
_version_ | 1835112689876074496 |
adam_text | SECURE WIRELESS SENSOR NETWORKS
/ CONTI, MAURO
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
PAIR-WISE KEY ESTABLISHMENT
CAPTURE DETECTION
CLONE DETECTION
SECURE DATA AGGREGATION
PRIVACY IN DATA AGGREGATION
CONCLUSIONS AND FUTURE WORKS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURE WIRELESS SENSOR NETWORKS
/ CONTI, MAURO
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK EXPLORES FIVE FUNDAMENTAL MECHANISMS TO BUILD SECURE WIRELESS
SENSOR NETWORKS (WSNS). IT PRESENTS SECURITY ISSUES RELATED TO A SINGLE
NODE WHICH DEALS WITH THE AUTHENTICATION AND COMMUNICATION
CONFIDENTIALITY WITH OTHER NODES. IT ALSO FOCUSES ON NETWORK SECURITY,
PROVIDING SOLUTIONS FOR THE NODE CAPTURE ATTACK AND THE CLONE ATTACK. IT
EXAMINES A NUMBER OF AREAS AND PROBLEMS TO WHICH WSNS ARE APPLIED
CONTINUOUSLY, INCLUDING: SUPPORTING RESCUE OPERATIONS, BUILDING
SURVEILLANCE, FIRE PREVENTION, BATTLEFIELD MONITORING AND MORE. HOWEVER,
KNOWN AND UNKNOWN THREATS STILL AFFECT WSNS AND IN MANY APPLICATIONS OF
THIS NEW TECHNOLOGY THE SECURITY OF THE NETWORK IS A FUNDAMENTAL ISSUE
FOR CONFIDENTIALITY, INTEGRITY, AUTHENTICITY AND AVAILABILITY. THE LAST
SECTION OF THE BOOK ADDRESSES SECURITY FOR A COMMON WSN SERVICE. CASE
STUDIES ARE PROVIDED THROUGHOUT. SECURE WIRELESS SENSOR NETWORKS:
THREATS AND SOLUTIONS TARGETS ADVANCED-LEVEL STUDENTS AND RESEARCHERS IN
COMPUTER SCIENCE AND ELECTRICAL ENGINEERING AS A SECONDARY TEXT BOOK.
PROFESSIONALS WORKING IN THE WIRELESS SENSOR NETWORKS FIELD WILL ALSO
FIND THIS BOOK USEFUL AS A REFERENCE.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Conti, Mauro |
author_facet | Conti, Mauro |
author_role | aut |
author_sort | Conti, Mauro |
author_variant | m c mc |
building | Verbundindex |
bvnumber | BV043209796 |
classification_rvk | ST 200 ST 273 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932033200 (DE-599)BVBBV043209796 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4939-3460-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04242nam a2200793zcb4500</leader><controlfield tag="001">BV043209796</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160701 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781493934607</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4939-3460-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4939-3460-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932033200</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209796</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Conti, Mauro</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Wireless Sensor Networks</subfield><subfield code="b">Threats and Solutions</subfield><subfield code="c">Mauro Conti ; foreword by Luigi Vincenzo Mancini</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 169 Seiten)</subfield><subfield code="b">50 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">65</subfield><subfield code="x">1568-2633</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4939-3458-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">65</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">65</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632957</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209796 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:31:13Z |
institution | BVB |
isbn | 9781493934607 |
issn | 1568-2633 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632957 |
oclc_num | 932033200 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XIII, 169 Seiten) 50 Illustrationen (farbig) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in Information Security |
spellingShingle | Conti, Mauro Secure Wireless Sensor Networks Threats and Solutions Advances in Information Security Computer science Computer communication systems Computer security Data encryption (Computer science) Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Data Encryption Informatik Sicherheitsplanung (DE-588)4217560-4 gnd Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd |
subject_GND | (DE-588)4217560-4 (DE-588)4274324-2 (DE-588)4789222-5 |
title | Secure Wireless Sensor Networks Threats and Solutions |
title_auth | Secure Wireless Sensor Networks Threats and Solutions |
title_exact_search | Secure Wireless Sensor Networks Threats and Solutions |
title_full | Secure Wireless Sensor Networks Threats and Solutions Mauro Conti ; foreword by Luigi Vincenzo Mancini |
title_fullStr | Secure Wireless Sensor Networks Threats and Solutions Mauro Conti ; foreword by Luigi Vincenzo Mancini |
title_full_unstemmed | Secure Wireless Sensor Networks Threats and Solutions Mauro Conti ; foreword by Luigi Vincenzo Mancini |
title_short | Secure Wireless Sensor Networks |
title_sort | secure wireless sensor networks threats and solutions |
title_sub | Threats and Solutions |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Data Encryption Informatik Sicherheitsplanung (DE-588)4217560-4 gnd Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Data Encryption Informatik Sicherheitsplanung Computersicherheit Drahtloses Sensorsystem |
url | https://doi.org/10.1007/978-1-4939-3460-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT contimauro securewirelesssensornetworksthreatsandsolutions |
Inhaltsverzeichnis Online lesen (LMU) In der Bibliothek der LMU nutzbar. Online lesen (HM) In der Bibliothek der Hochschule München (HM) nutzbar.