Cryptographic security solutions for the internet of things:
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-573 DE-20 DE-1049 DE-898 DE-706 DE-1050 DE-83 Volltex |
Zusammenfassung: | "This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"-- |
Beschreibung: | Description based on title screen (IGI Global, viewed 01/31/2019) |
Beschreibung: | 1 Online-Ressource (25 PDFs (xxiv, 367 pages)) |
ISBN: | 9781522557432 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046095941 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 190809s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781522557432 |9 978-1-5225-5743-2 | ||
024 | 7 | |a 10.4018/978-1-5225-5742-5 |2 doi | |
035 | |a (ZDB-1-IGE)00192031 | ||
035 | |a (OCoLC)1085389079 | ||
035 | |a (DE-599)BVBBV046095941 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-20 |a DE-1049 |a DE-898 |a DE-706 |a DE-1050 |a DE-83 | ||
082 | 0 | |a 005.8/24 |2 23 | |
245 | 1 | 0 | |a Cryptographic security solutions for the internet of things |c Mohammad Tariq Banday, editor |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource (25 PDFs (xxiv, 367 pages)) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on title screen (IGI Global, viewed 01/31/2019) | ||
520 | |a "This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"-- | ||
650 | 4 | |a Internet of things / Security measures | |
650 | 4 | |a Cryptography | |
700 | 1 | |a Banday, Mohammad Tariq |d 1969- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1522557423 |z 9781522557425 |
856 | 4 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltex | |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079019158241280 |
---|---|
adam_text | |
any_adam_object | |
author2 | Banday, Mohammad Tariq 1969- |
author2_role | edt |
author2_variant | m t b mt mtb |
author_facet | Banday, Mohammad Tariq 1969- |
building | Verbundindex |
bvnumber | BV046095941 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00192031 (OCoLC)1085389079 (DE-599)BVBBV046095941 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV046095941</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190809s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522557432</subfield><subfield code="9">978-1-5225-5743-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5742-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00192031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085389079</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046095941</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptographic security solutions for the internet of things</subfield><subfield code="c">Mohammad Tariq Banday, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (25 PDFs (xxiv, 367 pages))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/31/2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Banday, Mohammad Tariq</subfield><subfield code="d">1969-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1522557423</subfield><subfield code="z">9781522557425</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltex</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046095941 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:19Z |
institution | BVB |
isbn | 9781522557432 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031476796 |
oclc_num | 1085389079 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
physical | 1 Online-Ressource (25 PDFs (xxiv, 367 pages)) |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Cryptographic security solutions for the internet of things Mohammad Tariq Banday, editor Hershey, Pennsylvania IGI Global [2019] 1 Online-Ressource (25 PDFs (xxiv, 367 pages)) txt rdacontent c rdamedia cr rdacarrier Description based on title screen (IGI Global, viewed 01/31/2019) "This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"-- Internet of things / Security measures Cryptography Banday, Mohammad Tariq 1969- edt Erscheint auch als Druck-Ausgabe 1522557423 9781522557425 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 Verlag URL des Erstveröffentlichers Volltex |
spellingShingle | Cryptographic security solutions for the internet of things Internet of things / Security measures Cryptography |
title | Cryptographic security solutions for the internet of things |
title_auth | Cryptographic security solutions for the internet of things |
title_exact_search | Cryptographic security solutions for the internet of things |
title_full | Cryptographic security solutions for the internet of things Mohammad Tariq Banday, editor |
title_fullStr | Cryptographic security solutions for the internet of things Mohammad Tariq Banday, editor |
title_full_unstemmed | Cryptographic security solutions for the internet of things Mohammad Tariq Banday, editor |
title_short | Cryptographic security solutions for the internet of things |
title_sort | cryptographic security solutions for the internet of things |
topic | Internet of things / Security measures Cryptography |
topic_facet | Internet of things / Security measures Cryptography |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5 |
work_keys_str_mv | AT bandaymohammadtariq cryptographicsecuritysolutionsfortheinternetofthings |