Wireless sensor network security /:
Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problem...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, D.C. :
IOS Press,
©2008.
|
Schriftenreihe: | Cryptology and information security series ;
v. 1. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems. |
Beschreibung: | 1 online resource (v, 313 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781435678675 1435678672 9781607502937 1607502933 9781433712272 143371227X 6611733728 1281733725 9781281733726 9786611733728 6000006063 9786000006068 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn646750827 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 080324s2008 ne ob 001 0 eng d | ||
010 | |z 2008925581 | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d N$T |d YDXCP |d IOSPR |d COCUF |d IDEBK |d OCLCQ |d BUF |d OCLCQ |d FVL |d OCLCQ |d DKDLA |d OCLCO |d MERUC |d EBLCP |d OCLCQ |d DEBSZ |d OCLCQ |d AZK |d LOA |d AGLDB |d PIFAG |d ZCU |d OCLCQ |d U3W |d STF |d WRM |d OCLCQ |d VTS |d CEF |d NRAMU |d CRU |d ICG |d OCLCQ |d INT |d VT2 |d OCLCQ |d WYU |d TKN |d OCLCQ |d REC |d DKC |d OCLCQ |d M8D |d OCLCQ |d VLY |d UKAHL |d AJS |d OCLCO |d OCLCQ |d OCLCL |d OCLCQ | ||
019 | |a 277089959 |a 320549798 |a 491261438 |a 659287292 |a 660546099 |a 666878319 |a 673681754 |a 712978537 |a 722670200 |a 728036224 |a 767138363 |a 772520860 |a 961560383 |a 962621916 |a 1162025327 | ||
020 | |a 9781435678675 |q (electronic bk.) | ||
020 | |a 1435678672 |q (electronic bk.) | ||
020 | |a 9781607502937 | ||
020 | |a 1607502933 | ||
020 | |a 9781433712272 |q (ebk.) | ||
020 | |a 143371227X |q (ebk.) | ||
020 | |z 9781586038137 | ||
020 | |z 1586038133 | ||
020 | |a 6611733728 | ||
020 | |a 1281733725 | ||
020 | |a 9781281733726 | ||
020 | |a 9786611733728 | ||
020 | |a 6000006063 | ||
020 | |a 9786000006068 | ||
035 | |a (OCoLC)646750827 |z (OCoLC)277089959 |z (OCoLC)320549798 |z (OCoLC)491261438 |z (OCoLC)659287292 |z (OCoLC)660546099 |z (OCoLC)666878319 |z (OCoLC)673681754 |z (OCoLC)712978537 |z (OCoLC)722670200 |z (OCoLC)728036224 |z (OCoLC)767138363 |z (OCoLC)772520860 |z (OCoLC)961560383 |z (OCoLC)962621916 |z (OCoLC)1162025327 | ||
037 | |a 978-1-58603-813-7 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a TK7872.D48 |b W568 2008eb | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
082 | 7 | |a 681/.2 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Wireless sensor network security / |c edited by Javier Lopez and Jianying Zhou. |
260 | |a Amsterdam ; |a Washington, D.C. : |b IOS Press, |c ©2008. | ||
300 | |a 1 online resource (v, 313 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series ; |v v. 1 | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index. | |
520 | |a Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems. | ||
546 | |a English. | ||
650 | 0 | |a Sensor networks |x Security measures. | |
650 | 0 | |a Detectors |x Security measures. | |
650 | 6 | |a Réseaux de capteurs |x Sécurité |x Mesures. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Sensors. |2 bisacsh | |
700 | 1 | |a López, Javier. | |
700 | 1 | |a Zhou, Jianying. | |
776 | 0 | 8 | |i Print version: |t Wireless sensor network security. |d Amsterdam ; Washington, D.C. : IOS Press, ©2008 |w (DLC) 2008925581 |
830 | 0 | |a Cryptology and information security series ; |v v. 1. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244448 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL346208 | ||
938 | |a ebrary |b EBRY |n ebr10231725 | ||
938 | |a EBSCOhost |b EBSC |n 244448 | ||
938 | |a YBP Library Services |b YANK |n 3207301 | ||
938 | |a YBP Library Services |b YANK |n 2916448 | ||
938 | |a YBP Library Services |b YANK |n 2823747 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH37540519 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn646750827 |
---|---|
_version_ | 1816881724882157568 |
adam_text | |
any_adam_object | |
author2 | López, Javier Zhou, Jianying |
author2_role | |
author2_variant | j l jl j z jz |
author_facet | López, Javier Zhou, Jianying |
author_sort | López, Javier |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK7872 |
callnumber-raw | TK7872.D48 W568 2008eb |
callnumber-search | TK7872.D48 W568 2008eb |
callnumber-sort | TK 47872 D48 W568 42008EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index. |
ctrlnum | (OCoLC)646750827 |
dewey-full | 681/.2 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 681 - Precision instruments and other devices |
dewey-raw | 681/.2 |
dewey-search | 681/.2 |
dewey-sort | 3681 12 |
dewey-tens | 680 - Manufacture of products for specific uses |
discipline | Handwerk und Gewerbe / Verschiedene Technologien |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04132cam a2200721Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn646750827</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080324s2008 ne ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008925581</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IOSPR</subfield><subfield code="d">COCUF</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BUF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MERUC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">CRU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">REC</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">UKAHL</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">277089959</subfield><subfield code="a">320549798</subfield><subfield code="a">491261438</subfield><subfield code="a">659287292</subfield><subfield code="a">660546099</subfield><subfield code="a">666878319</subfield><subfield code="a">673681754</subfield><subfield code="a">712978537</subfield><subfield code="a">722670200</subfield><subfield code="a">728036224</subfield><subfield code="a">767138363</subfield><subfield code="a">772520860</subfield><subfield code="a">961560383</subfield><subfield code="a">962621916</subfield><subfield code="a">1162025327</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435678675</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435678672</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607502937</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607502933</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781433712272</subfield><subfield code="q">(ebk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">143371227X</subfield><subfield code="q">(ebk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781586038137</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1586038133</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611733728</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281733725</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281733726</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611733728</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6000006063</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786000006068</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646750827</subfield><subfield code="z">(OCoLC)277089959</subfield><subfield code="z">(OCoLC)320549798</subfield><subfield code="z">(OCoLC)491261438</subfield><subfield code="z">(OCoLC)659287292</subfield><subfield code="z">(OCoLC)660546099</subfield><subfield code="z">(OCoLC)666878319</subfield><subfield code="z">(OCoLC)673681754</subfield><subfield code="z">(OCoLC)712978537</subfield><subfield code="z">(OCoLC)722670200</subfield><subfield code="z">(OCoLC)728036224</subfield><subfield code="z">(OCoLC)767138363</subfield><subfield code="z">(OCoLC)772520860</subfield><subfield code="z">(OCoLC)961560383</subfield><subfield code="z">(OCoLC)962621916</subfield><subfield code="z">(OCoLC)1162025327</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-58603-813-7</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7872.D48</subfield><subfield code="b">W568 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">681/.2</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Wireless sensor network security /</subfield><subfield code="c">edited by Javier Lopez and Jianying Zhou.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, D.C. :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (v, 313 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 1</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Detectors</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux de capteurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Sensors.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">López, Javier.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Jianying.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Wireless sensor network security.</subfield><subfield code="d">Amsterdam ; Washington, D.C. : IOS Press, ©2008</subfield><subfield code="w">(DLC) 2008925581</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 1.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244448</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL346208</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10231725</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">244448</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3207301</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2916448</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2823747</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37540519</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn646750827 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:17:16Z |
institution | BVB |
isbn | 9781435678675 1435678672 9781607502937 1607502933 9781433712272 143371227X 6611733728 1281733725 9781281733726 9786611733728 6000006063 9786000006068 |
language | English |
oclc_num | 646750827 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (v, 313 pages) |
psigel | ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IOS Press, |
record_format | marc |
series | Cryptology and information security series ; |
series2 | Cryptology and information security series ; |
spelling | Wireless sensor network security / edited by Javier Lopez and Jianying Zhou. Amsterdam ; Washington, D.C. : IOS Press, ©2008. 1 online resource (v, 313 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Cryptology and information security series ; v. 1 Includes bibliographical references and index. Print version record. Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index. Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems. English. Sensor networks Security measures. Detectors Security measures. Réseaux de capteurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Sensors. bisacsh López, Javier. Zhou, Jianying. Print version: Wireless sensor network security. Amsterdam ; Washington, D.C. : IOS Press, ©2008 (DLC) 2008925581 Cryptology and information security series ; v. 1. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244448 Volltext |
spellingShingle | Wireless sensor network security / Cryptology and information security series ; Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index. Sensor networks Security measures. Detectors Security measures. Réseaux de capteurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Sensors. bisacsh |
title | Wireless sensor network security / |
title_auth | Wireless sensor network security / |
title_exact_search | Wireless sensor network security / |
title_full | Wireless sensor network security / edited by Javier Lopez and Jianying Zhou. |
title_fullStr | Wireless sensor network security / edited by Javier Lopez and Jianying Zhou. |
title_full_unstemmed | Wireless sensor network security / edited by Javier Lopez and Jianying Zhou. |
title_short | Wireless sensor network security / |
title_sort | wireless sensor network security |
topic | Sensor networks Security measures. Detectors Security measures. Réseaux de capteurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Sensors. bisacsh |
topic_facet | Sensor networks Security measures. Detectors Security measures. Réseaux de capteurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Sensors. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=244448 |
work_keys_str_mv | AT lopezjavier wirelesssensornetworksecurity AT zhoujianying wirelesssensornetworksecurity |