0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Security for Wireless Sensor Networks using Identity-Based Cryptography (Paperback): Harsh Kupwade Patil, Stephen A. Szygenda Security for Wireless Sensor Networks using Identity-Based Cryptography (Paperback)
Harsh Kupwade Patil, Stephen A. Szygenda
R1,438 Discovery Miles 14 380 Ships in 10 - 15 working days

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.

Security for Wireless Sensor Networks using Identity-Based Cryptography (Hardcover, New): Harsh Kupwade Patil, Stephen A.... Security for Wireless Sensor Networks using Identity-Based Cryptography (Hardcover, New)
Harsh Kupwade Patil, Stephen A. Szygenda
R4,207 Discovery Miles 42 070 Ships in 10 - 15 working days

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.
After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.
Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Imtiaz Sooliman And The Gift Of The…
Shafiq Morton Paperback  (1)
R360 R332 Discovery Miles 3 320
Minions: The Rise of Gru
DVD R157 Discovery Miles 1 570
Sluggem Pellets (500g)
R159 R140 Discovery Miles 1 400
ZA Body Shaper Slimming Underwear - Tan…
R570 R399 Discovery Miles 3 990
Armaggeddon Silent Fan(14cm)(Black)
R159 R99 Discovery Miles 990
STEM Activity: Sensational Science
Steph Clarkson Paperback  (4)
R236 R216 Discovery Miles 2 160
Gotcha Digital-Midsize 30 M-WR Ladies…
R250 R216 Discovery Miles 2 160
PostUCare™ 3-in-1 Ergonomic & Posture…
 (1)
R2,599 R2,099 Discovery Miles 20 990
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990

 

Partners