Cryptographic security solutions for the Internet of Things

"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of...

Full description

Bibliographic Details
Other Authors: Banday, Mohammad Tariq, 1969-
Format: eBook
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global, [2019]
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03230cam a2200457Ii 4500
001 koha001013104
005 20250222065949.0
006 m d
007 cr cnu---unuuu
008 190131s2019 pau ob 001 0 eng d
035 |a koha001013104 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IGIGL  |d N$T  |d EBLCP  |d YDX  |d AJB 
020 |a 9781522557432  |q (electronic bk.) 
020 |a 1522557431  |q (electronic bk.) 
020 |z 9781522557425 
020 |z 1522557423 
050 4 |a TK5102.94  |b .C77 2019eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8/24  |2 23 
245 0 0 |a Cryptographic security solutions for the Internet of Things  |c Mohammad Tariq Banday, editor. 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global,  |c [2019] 
300 |a 1 online resource 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index 
520 |a "This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--  |c Provided by publisher. 
505 0 |a Title Page; Copyright Page; Book Series; Editorial Advisory Board; Table of Contents; Detailed Table of Contents; Foreword; Preface; Acknowledgment; Section 1: Introduction; Chapter 1: Security in Context of the Internet of Things; Section 2: Encryption and Cryptography; Chapter 2: Encryption Principles and Techniques for the Internet of Things; Chapter 3: A Review of Cryptographic Algorithms for the Internet of Things; Section 3: Security Protocols; Chapter 4: Addressing Security Issues of the Internet of Things Using Physically Unclonable Functions 
505 8 |a Chapter 5: Hardware Primitives-Based Security Protocols for the Internet of ThingsChapter 6: Secure Computation of Private Set Intersection Cardinality With Linear Complexity; Chapter 7: A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET; Chapter 8: Preserving Security of Mobile Anchors Against Physical Layer Attacks; Chapter 9: An Adaptive Security Framework for the Internet of Things Applications Based on the Contextual Information; Section 4: Social/Legal Issues and Forensics 
505 8 |a Chapter 10: Emerging Social and Legal Issues of the Internet of ThingsChapter 11: Digital Forensics in the Context of the Internet of Things; Compilation of References; About the Contributors; Index 
653 0 |a Internet of things  |x Security measures. 
653 0 |a Cryptography. 
653 7 |a COMPUTERS / Security / General.  |2 bisacsh 
653 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
655 0 |a EBSCO eBooks  |9 905790 
655 0 |a Electronic books.  |9 899821 
655 4 |a Electronic books.  |9 899821 
700 1 |a Banday, Mohammad Tariq,  |d 1969-  |9 910987 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2013198.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013104 
910 |a EBSCO eBooks 
999 |c 1013104  |d 1013104 
039