menor preço: € 49,00, preço mais alto: € 77,22, preço médio: € 60,08
(*)
Subhankar Chattopadhyay: Key Pre-distribution and Key Revocation in Wireless Sensor Networks : A deterministic key pre-distribution approach and a distributed key revocation mechanism - Livro de bolso
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrai… mais…
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. 72 pp. Englisch<
AbeBooks.de
AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Custos de envio:Versandkostenfrei. (EUR 0.00) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher > Fremdsprachige Bücher > Englische Bücher 220 x 150 x 4 mm , LAP LAMBERT Academic Publishing, Taschenbuch, LAP LAMBERT Academic Publishing<
Orellfuessli.ch
Nr. A1019930392. Custos de envio:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 18.70) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Orellfuessli.ch
Nr. 30579426. Custos de envio:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 3 Wochen, zzgl. Versandkosten. (EUR 16.62) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Orellfuessli.ch
Nr. 30579426. Custos de envio:, Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 16.77) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher, Hörbücher & Kalender / Bücher / Sachbuch / Computer & IT / Netzwerke & Internet<
Dodax.de
Nr. VEL1SHDTQ5M. Custos de envio:, Lieferzeit: 5 Tage, DE. (EUR 0.00) Details...
(*) Livro esgotado significa que o livro não está disponível em qualquer uma das plataformas associadas buscamos.
Key Pre-distribution and Key Revocation in Wireless Sensor Networks : A deterministic key pre-distribution approach and a distributed key revocation mechanism - Livro de bolso
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrai… mais…
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. 72 pp. Englisch<
NEW BOOK. Custos de envio:Versandkostenfrei. (EUR 0.00) AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)]
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher > Fremdsprachige Bücher > Englische Bücher 220 x 150 x 4 mm , LAP LAMBERT Academic Publishing, Taschenbuch, LAP LAMBERT Academic Publishing<
Nr. A1019930392. Custos de envio:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 18.70)
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Nr. 30579426. Custos de envio:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 3 Wochen, zzgl. Versandkosten. (EUR 16.62)
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Nr. 30579426. Custos de envio:, Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 16.77)
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… mais…
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher, Hörbücher & Kalender / Bücher / Sachbuch / Computer & IT / Netzwerke & Internet<
Nr. VEL1SHDTQ5M. Custos de envio:, Lieferzeit: 5 Tage, DE. (EUR 0.00)
1Como algumas plataformas não transmitem condições de envio e estas podem depender do país de entrega, do preço de compra, do peso e tamanho do artigo, de uma possível adesão à plataforma, de uma entrega directa pela plataforma ou através de um terceiro fornecedor (Marketplace), etc., é possível que os custos de envio indicados pelo eurolivro não correspondam aos da plataforma ofertante.
Dados bibliográficos do melhor livro correspondente
Dados detalhados do livro - Key Pre-distribution and Key Revocation in Wireless Sensor Networks
EAN (ISBN-13): 9783846557754 ISBN (ISBN-10): 3846557757 Livro de capa dura Livro de bolso Ano de publicação: 2011 Editor/Editora: LAP LAMBERT Academic Publishing
Livro na base de dados desde 2009-08-23T23:44:15+01:00 (Lisbon) Página de detalhes modificada pela última vez em 2022-08-17T16:20:54+01:00 (Lisbon) Número ISBN/EAN: 3846557757
Número ISBN - Ortografia alternativa: 3-8465-5775-7, 978-3-8465-5775-4 Ortografia alternativa e termos de pesquisa relacionados: Autor do livro: ashok, kumar, chattopadhyay Título do livro: wireless sensor networks