MARC details
000 -LEADER |
fixed length control field |
03271nam a22004815i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231104114311.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151106s2015 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781493934607 |
Canceled/invalid ISBN |
978-1-4939-3460-7 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-1-4939-3460-7 |
Source of number or code |
doi |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
TR-AnTOB |
Language of cataloging |
eng |
Transcribing agency |
TR-AnTOB |
Description conventions |
rda |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.5-5105.9 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UKN |
Source |
bicssc |
|
Subject category code |
COM075000 |
Source |
bisacsh |
|
Subject category code |
UKN |
Source |
thema004.6 |
-- |
23 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
İngilizce |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Conti, Mauro. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT |
Title |
Secure Wireless Sensor Networks : |
Remainder of title |
Threats and Solutions / |
Statement of responsibility, etc. |
by Mauro Conti. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2015. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York, NY : |
Name of producer, publisher, distributor, manufacturer |
Springer New York : |
-- |
Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
490 0# - SERIES STATEMENT |
Series statement |
Advances in Information Security, |
International Standard Serial Number |
1568-2633 ; |
Volume/sequential designation |
65 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- Pair-wise key establishment -- Capture Detection -- Clone Detection -- Secure Data Aggregation -- Privacy in Data Aggregation -- Conclusions and Future Works. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack. It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last section of the book addresses security for a common WSN service. Case studies are provided throughout. Secure Wireless Sensor Networks: Threats and Solutions targets advanced-level students and researchers in computer science and electrical engineering as a secondary text book. Professionals working in the wireless sensor networks field will also find this book useful as a reference. . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer Communication Networks. |
|
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
Telecommunication. |
|
Topical term or geographic name entry element |
Data encryption (Computer science). |
|
Topical term or geographic name entry element |
Computer Communication Networks. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I13022 |
|
Topical term or geographic name entry element |
Systems and Data Security. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28060 |
|
Topical term or geographic name entry element |
Communications Engineering, Networks. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/T24035 |
|
Topical term or geographic name entry element |
Cryptology. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28020 |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-1-4939-3460-7">https://doi.org/10.1007/978-1-4939-3460-7</a> |
Materials specified |
Springer eBooks |
Public note |
Online access link to the resource |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
E-Book |