Secure Wireless Sensor Networks: Threats and Solutions
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2015
|
Schriftenreihe: | Advances in Information Security
65 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 169 Seiten) 50 Illustrationen (farbig) |
ISBN: | 9781493934607 |
ISSN: | 1568-2633 |
DOI: | 10.1007/978-1-4939-3460-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209796 | ||
003 | DE-604 | ||
005 | 20160701 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781493934607 |c Online |9 978-1-4939-3460-7 | ||
024 | 7 | |a 10.1007/978-1-4939-3460-7 |2 doi | |
035 | |a (OCoLC)932033200 | ||
035 | |a (DE-599)BVBBV043209796 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 004.6 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
100 | 1 | |a Conti, Mauro |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure Wireless Sensor Networks |b Threats and Solutions |c Mauro Conti ; foreword by Luigi Vincenzo Mancini |
264 | 1 | |a New York, NY |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 169 Seiten) |b 50 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security |v 65 |x 1568-2633 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4939-3458-4 |
830 | 0 | |a Advances in Information Security |v 65 |w (DE-604)BV022281064 |9 65 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4939-3460-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632957 | ||
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4939-3460-7 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709311074304 |
---|---|
adam_text | SECURE WIRELESS SENSOR NETWORKS
/ CONTI, MAURO
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
PAIR-WISE KEY ESTABLISHMENT
CAPTURE DETECTION
CLONE DETECTION
SECURE DATA AGGREGATION
PRIVACY IN DATA AGGREGATION
CONCLUSIONS AND FUTURE WORKS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURE WIRELESS SENSOR NETWORKS
/ CONTI, MAURO
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK EXPLORES FIVE FUNDAMENTAL MECHANISMS TO BUILD SECURE WIRELESS
SENSOR NETWORKS (WSNS). IT PRESENTS SECURITY ISSUES RELATED TO A SINGLE
NODE WHICH DEALS WITH THE AUTHENTICATION AND COMMUNICATION
CONFIDENTIALITY WITH OTHER NODES. IT ALSO FOCUSES ON NETWORK SECURITY,
PROVIDING SOLUTIONS FOR THE NODE CAPTURE ATTACK AND THE CLONE ATTACK. IT
EXAMINES A NUMBER OF AREAS AND PROBLEMS TO WHICH WSNS ARE APPLIED
CONTINUOUSLY, INCLUDING: SUPPORTING RESCUE OPERATIONS, BUILDING
SURVEILLANCE, FIRE PREVENTION, BATTLEFIELD MONITORING AND MORE. HOWEVER,
KNOWN AND UNKNOWN THREATS STILL AFFECT WSNS AND IN MANY APPLICATIONS OF
THIS NEW TECHNOLOGY THE SECURITY OF THE NETWORK IS A FUNDAMENTAL ISSUE
FOR CONFIDENTIALITY, INTEGRITY, AUTHENTICITY AND AVAILABILITY. THE LAST
SECTION OF THE BOOK ADDRESSES SECURITY FOR A COMMON WSN SERVICE. CASE
STUDIES ARE PROVIDED THROUGHOUT. SECURE WIRELESS SENSOR NETWORKS:
THREATS AND SOLUTIONS TARGETS ADVANCED-LEVEL STUDENTS AND RESEARCHERS IN
COMPUTER SCIENCE AND ELECTRICAL ENGINEERING AS A SECONDARY TEXT BOOK.
PROFESSIONALS WORKING IN THE WIRELESS SENSOR NETWORKS FIELD WILL ALSO
FIND THIS BOOK USEFUL AS A REFERENCE.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Conti, Mauro |
author_facet | Conti, Mauro |
author_role | aut |
author_sort | Conti, Mauro |
author_variant | m c mc |
building | Verbundindex |
bvnumber | BV043209796 |
classification_rvk | ST 200 ST 273 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932033200 (DE-599)BVBBV043209796 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4939-3460-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04229nmm a2200793zcb4500</leader><controlfield tag="001">BV043209796</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160701 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781493934607</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4939-3460-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4939-3460-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932033200</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209796</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Conti, Mauro</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Wireless Sensor Networks</subfield><subfield code="b">Threats and Solutions</subfield><subfield code="c">Mauro Conti ; foreword by Luigi Vincenzo Mancini</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 169 Seiten)</subfield><subfield code="b">50 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">65</subfield><subfield code="x">1568-2633</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4939-3458-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">65</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">65</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632957</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4939-3460-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209796 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
isbn | 9781493934607 |
issn | 1568-2633 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632957 |
oclc_num | 932033200 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XIII, 169 Seiten) 50 Illustrationen (farbig) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in Information Security |
spelling | Conti, Mauro Verfasser aut Secure Wireless Sensor Networks Threats and Solutions Mauro Conti ; foreword by Luigi Vincenzo Mancini New York, NY Springer 2015 1 Online-Ressource (XIII, 169 Seiten) 50 Illustrationen (farbig) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 65 1568-2633 Computer science Computer communication systems Computer security Data encryption (Computer science) Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Data Encryption Informatik Sicherheitsplanung (DE-588)4217560-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Drahtloses Sensorsystem (DE-588)4789222-5 gnd rswk-swf Drahtloses Sensorsystem (DE-588)4789222-5 s Computersicherheit (DE-588)4274324-2 s Sicherheitsplanung (DE-588)4217560-4 s DE-604 Erscheint auch als Druckausgabe 978-1-4939-3458-4 Advances in Information Security 65 (DE-604)BV022281064 65 https://doi.org/10.1007/978-1-4939-3460-7 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Conti, Mauro Secure Wireless Sensor Networks Threats and Solutions Advances in Information Security Computer science Computer communication systems Computer security Data encryption (Computer science) Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Data Encryption Informatik Sicherheitsplanung (DE-588)4217560-4 gnd Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd |
subject_GND | (DE-588)4217560-4 (DE-588)4274324-2 (DE-588)4789222-5 |
title | Secure Wireless Sensor Networks Threats and Solutions |
title_auth | Secure Wireless Sensor Networks Threats and Solutions |
title_exact_search | Secure Wireless Sensor Networks Threats and Solutions |
title_full | Secure Wireless Sensor Networks Threats and Solutions Mauro Conti ; foreword by Luigi Vincenzo Mancini |
title_fullStr | Secure Wireless Sensor Networks Threats and Solutions Mauro Conti ; foreword by Luigi Vincenzo Mancini |
title_full_unstemmed | Secure Wireless Sensor Networks Threats and Solutions Mauro Conti ; foreword by Luigi Vincenzo Mancini |
title_short | Secure Wireless Sensor Networks |
title_sort | secure wireless sensor networks threats and solutions |
title_sub | Threats and Solutions |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Data Encryption Informatik Sicherheitsplanung (DE-588)4217560-4 gnd Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Data Encryption Informatik Sicherheitsplanung Computersicherheit Drahtloses Sensorsystem |
url | https://doi.org/10.1007/978-1-4939-3460-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT contimauro securewirelesssensornetworksthreatsandsolutions |