Security and privacy in smart sensor networks:
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Disseminator of Knowledge
[2018]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-1049 DE-91 DE-706 DE-20 DE-898 DE-83 Volltext |
Zusammenfassung: | "This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"... |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxii, 441 Seiten) |
ISBN: | 9781522557371 |
DOI: | 10.4018/978-1-5225-5736-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044933809 | ||
003 | DE-604 | ||
005 | 20190905 | ||
007 | cr|uuu---uuuuu | ||
008 | 180508s2018 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522557371 |9 978-1-5225-5737-1 | ||
024 | 7 | |a 10.4018/978-1-5225-5736-4 |2 doi | |
035 | |a (OCoLC)1035472834 | ||
035 | |a (DE-599)BVBBV044933809 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-706 |a DE-573 |a DE-91 |a DE-20 |a DE-898 |a DE-83 | ||
050 | 0 | |a TK7872.D48 | |
082 | 0 | |a 006..2/5 |2 23 | |
245 | 1 | 0 | |a Security and privacy in smart sensor networks |c Yassine Maleh (University Hassan I, Morocco), Abdellah Ezzati (University Hassan I, Morocco), Mustapha Belaissaoui (University Hassan I, Morocco) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (xxii, 441 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | |a "This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"... | ||
650 | 4 | |a Sensor networks |x Security measures | |
700 | 1 | |a Maleh, Yassine |d 1987- |0 (DE-588)1190215594 |4 edt | |
700 | 1 | |a Ezzati, Abdellah |d 1966- |4 edt | |
700 | 1 | |a Belaissaoui, Mustapha |d 1968- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-5736-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-5736-9 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-5736-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-5736-4 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5736-4 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE18 |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5736-4 |l DE-706 |p ZDB-1-IGE |q ZDB-1-IGE18 |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5736-4 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5736-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079016236908544 |
---|---|
adam_text | |
any_adam_object | |
author2 | Maleh, Yassine 1987- Ezzati, Abdellah 1966- Belaissaoui, Mustapha 1968- |
author2_role | edt edt edt |
author2_variant | y m ym a e ae m b mb |
author_GND | (DE-588)1190215594 |
author_facet | Maleh, Yassine 1987- Ezzati, Abdellah 1966- Belaissaoui, Mustapha 1968- |
building | Verbundindex |
bvnumber | BV044933809 |
callnumber-first | T - Technology |
callnumber-label | TK7872 |
callnumber-raw | TK7872.D48 |
callnumber-search | TK7872.D48 |
callnumber-sort | TK 47872 D48 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB ZDB-1-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1035472834 (DE-599)BVBBV044933809 |
dewey-full | 006..2/5 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006..2/5 |
dewey-search | 006..2/5 |
dewey-sort | 16 12 15 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-5736-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044933809</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190905</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180508s2018 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522557371</subfield><subfield code="9">978-1-5225-5737-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5736-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1035472834</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044933809</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK7872.D48</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006..2/5</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy in smart sensor networks</subfield><subfield code="c">Yassine Maleh (University Hassan I, Morocco), Abdellah Ezzati (University Hassan I, Morocco), Mustapha Belaissaoui (University Hassan I, Morocco)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 441 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maleh, Yassine</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1190215594</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ezzati, Abdellah</subfield><subfield code="d">1966-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Belaissaoui, Mustapha</subfield><subfield code="d">1968-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-5736-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-5736-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-5736-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE18</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE18</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5736-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044933809 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:16Z |
institution | BVB |
isbn | 9781522557371 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030326820 |
oclc_num | 1035472834 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxii, 441 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE18 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Security and privacy in smart sensor networks Yassine Maleh (University Hassan I, Morocco), Abdellah Ezzati (University Hassan I, Morocco), Mustapha Belaissaoui (University Hassan I, Morocco) Hershey PA, USA IGI Global, Disseminator of Knowledge [2018] © 2018 1 Online-Ressource (xxii, 441 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source Includes bibliographical references and index "This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"... Sensor networks Security measures Maleh, Yassine 1987- (DE-588)1190215594 edt Ezzati, Abdellah 1966- edt Belaissaoui, Mustapha 1968- edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-5736-4 Erscheint auch als Druck-Ausgabe 1-5225-5736-9 https://doi.org/10.4018/978-1-5225-5736-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security and privacy in smart sensor networks Sensor networks Security measures |
title | Security and privacy in smart sensor networks |
title_auth | Security and privacy in smart sensor networks |
title_exact_search | Security and privacy in smart sensor networks |
title_full | Security and privacy in smart sensor networks Yassine Maleh (University Hassan I, Morocco), Abdellah Ezzati (University Hassan I, Morocco), Mustapha Belaissaoui (University Hassan I, Morocco) |
title_fullStr | Security and privacy in smart sensor networks Yassine Maleh (University Hassan I, Morocco), Abdellah Ezzati (University Hassan I, Morocco), Mustapha Belaissaoui (University Hassan I, Morocco) |
title_full_unstemmed | Security and privacy in smart sensor networks Yassine Maleh (University Hassan I, Morocco), Abdellah Ezzati (University Hassan I, Morocco), Mustapha Belaissaoui (University Hassan I, Morocco) |
title_short | Security and privacy in smart sensor networks |
title_sort | security and privacy in smart sensor networks |
topic | Sensor networks Security measures |
topic_facet | Sensor networks Security measures |
url | https://doi.org/10.4018/978-1-5225-5736-4 |
work_keys_str_mv | AT malehyassine securityandprivacyinsmartsensornetworks AT ezzatiabdellah securityandprivacyinsmartsensornetworks AT belaissaouimustapha securityandprivacyinsmartsensornetworks |