Cryptographic security solutions for the Internet of Things
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of...
| Other Authors: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global,
[2019]
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 03230cam a2200457Ii 4500 | ||
|---|---|---|---|
| 001 | koha001013104 | ||
| 005 | 20250222065949.0 | ||
| 006 | m d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 190131s2019 pau ob 001 0 eng d | ||
| 035 | |a koha001013104 | ||
| 040 | |a N$T |b eng |e rda |e pn |c N$T |d IGIGL |d N$T |d EBLCP |d YDX |d AJB | ||
| 020 | |a 9781522557432 |q (electronic bk.) | ||
| 020 | |a 1522557431 |q (electronic bk.) | ||
| 020 | |z 9781522557425 | ||
| 020 | |z 1522557423 | ||
| 050 | 4 | |a TK5102.94 |b .C77 2019eb | |
| 072 | 7 | |a COM |x 053000 |2 bisacsh | |
| 082 | 0 | 4 | |a 005.8/24 |2 23 |
| 245 | 0 | 0 | |a Cryptographic security solutions for the Internet of Things |c Mohammad Tariq Banday, editor. |
| 264 | 1 | |a Hershey, PA |b Information Science Reference, an imprint of IGI Global, |c [2019] | |
| 300 | |a 1 online resource | ||
| 588 | 0 | |a Print version record. | |
| 504 | |a Includes bibliographical references and index | ||
| 520 | |a "This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"-- |c Provided by publisher. | ||
| 505 | 0 | |a Title Page; Copyright Page; Book Series; Editorial Advisory Board; Table of Contents; Detailed Table of Contents; Foreword; Preface; Acknowledgment; Section 1: Introduction; Chapter 1: Security in Context of the Internet of Things; Section 2: Encryption and Cryptography; Chapter 2: Encryption Principles and Techniques for the Internet of Things; Chapter 3: A Review of Cryptographic Algorithms for the Internet of Things; Section 3: Security Protocols; Chapter 4: Addressing Security Issues of the Internet of Things Using Physically Unclonable Functions | |
| 505 | 8 | |a Chapter 5: Hardware Primitives-Based Security Protocols for the Internet of ThingsChapter 6: Secure Computation of Private Set Intersection Cardinality With Linear Complexity; Chapter 7: A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET; Chapter 8: Preserving Security of Mobile Anchors Against Physical Layer Attacks; Chapter 9: An Adaptive Security Framework for the Internet of Things Applications Based on the Contextual Information; Section 4: Social/Legal Issues and Forensics | |
| 505 | 8 | |a Chapter 10: Emerging Social and Legal Issues of the Internet of ThingsChapter 11: Digital Forensics in the Context of the Internet of Things; Compilation of References; About the Contributors; Index | |
| 653 | 0 | |a Internet of things |x Security measures. | |
| 653 | 0 | |a Cryptography. | |
| 653 | 7 | |a COMPUTERS / Security / General. |2 bisacsh | |
| 653 | 7 | |a Cryptography. |2 fast |0 (OCoLC)fst00884552 | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 0 | |a Electronic books. |9 899821 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 700 | 1 | |a Banday, Mohammad Tariq, |d 1969- |9 910987 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/2013198.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013104 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1013104 |d 1013104 | ||
| 039 | |||
