| 000 | 02807nam a22005175i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-46781-8 | ||
| 003 | DE-He213 | ||
| 005 | 20250710084001.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2007 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387467818 _a99780387467818 |
||
| 024 | 7 |
_a10.1007/978-0-387-46781-8 _2doi |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aLiu, Donggang. _eauthor. |
|
| 245 | 1 | 0 |
_aSecurity for Wireless Sensor Networks _h[recurso electrónico] / _cby Donggang Liu, Peng Ning. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2007. |
|
| 300 |
_aXI, 209 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v28 |
|
| 505 | 0 | _aBroadcast Authentication -- Pairwise Key Establishment -- Improving Pairwise Key Establishment Using Deployment Knowledge -- Secure Localization -- Summary and Future Work. | |
| 520 | _aWireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aCOMPUTER NETWORK ARCHITECTURES. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aCODING THEORY. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aCODING AND INFORMATION THEORY. |
| 700 | 1 |
_aNing, Peng. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387327235 |
| 830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v28 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-46781-8 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c57714 _d57714 |
||