prezzo più basso: € 49,00, prezzo più alto: € 77,22, prezzo medio: € 60,08
(*)
Subhankar Chattopadhyay: Key Pre-distribution and Key Revocation in Wireless Sensor Networks : A deterministic key pre-distribution approach and a distributed key revocation mechanism - edizione con copertina flessibile
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrai… Altro …
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. 72 pp. Englisch<
AbeBooks.de
AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Costi di spedizione:Versandkostenfrei. (EUR 0.00) Details...
(*) Libro esaurito significa che il libro non è attualmente disponibile in una qualsiasi delle piattaforme associate che di ricerca.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher > Fremdsprachige Bücher > Englische Bücher 220 x 150 x 4 mm , LAP LAMBERT Academic Publishing, Taschenbuch, LAP LAMBERT Academic Publishing<
Orellfuessli.ch
Nr. A1019930392. Costi di spedizione:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 18.70) Details...
(*) Libro esaurito significa che il libro non è attualmente disponibile in una qualsiasi delle piattaforme associate che di ricerca.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Orellfuessli.ch
Nr. 30579426. Costi di spedizione:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 3 Wochen, zzgl. Versandkosten. (EUR 16.62) Details...
(*) Libro esaurito significa che il libro non è attualmente disponibile in una qualsiasi delle piattaforme associate che di ricerca.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Orellfuessli.ch
Nr. 30579426. Costi di spedizione:, Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 16.77) Details...
(*) Libro esaurito significa che il libro non è attualmente disponibile in una qualsiasi delle piattaforme associate che di ricerca.
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher, Hörbücher & Kalender / Bücher / Sachbuch / Computer & IT / Netzwerke & Internet<
Dodax.de
Nr. VEL1SHDTQ5M. Costi di spedizione:, Lieferzeit: 5 Tage, DE. (EUR 0.00) Details...
(*) Libro esaurito significa che il libro non è attualmente disponibile in una qualsiasi delle piattaforme associate che di ricerca.
Key Pre-distribution and Key Revocation in Wireless Sensor Networks : A deterministic key pre-distribution approach and a distributed key revocation mechanism - edizione con copertina flessibile
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrai… Altro …
[EAN: 9783846557754], Neubuch, [PU: LAP Lambert Academic Publishing Nov 2011], This item is printed on demand - Print on Demand Neuware - Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. 72 pp. Englisch<
NEW BOOK. Costi di spedizione:Versandkostenfrei. (EUR 0.00) AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)]
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher > Fremdsprachige Bücher > Englische Bücher 220 x 150 x 4 mm , LAP LAMBERT Academic Publishing, Taschenbuch, LAP LAMBERT Academic Publishing<
Nr. A1019930392. Costi di spedizione:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 18.70)
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Nr. 30579426. Costi di spedizione:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 3 Wochen, zzgl. Versandkosten. (EUR 16.62)
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Buch (fremdspr.) Subhankar Chattopadhyay#Ashok Kumar Turuk Taschenbuch, LAP LAMBERT Academic Publishing, 01.11.2011, LAP LAMBERT Academic Publishing, 2011<
Nr. 30579426. Costi di spedizione:, Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 16.77)
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secu… Altro …
Sensor networks are composed of resource constrained tiny sensor devices. They have less computational power and memory. Communication in sensor network is done in multi-hop, and for secure communication, neighboring sensor nodes must possess a secret common key among them. Symmetric and public key cryptography require more processing and memory space. Hence, they are not suitable for sensor network. In this book we proposed a deterministic key pre-distribution scheme using BCH codes. We mapped the BCH code to key identifier and the keys corresponding to each key identifier are installed into the sensor nodes before deployment. We compared our proposed scheme with existing one and found that it has a better resiliency. Our proposed scheme is scalable and requires the same or less number of keys for a given number of nodes than the existing well known schemes. We have also proposed an efficient key revocation technique using a novel distributed voting mechanism in which neighboring nodes of a sensor can vote against it if they suspect the node to be a compromised one. In the proposed key revocation scheme compromised nodes as well as the compromised keys are completely removed. Bücher, Hörbücher & Kalender / Bücher / Sachbuch / Computer & IT / Netzwerke & Internet<
Nr. VEL1SHDTQ5M. Costi di spedizione:, Lieferzeit: 5 Tage, DE. (EUR 0.00)
1Poiché alcune piattaforme non trasmettono le condizioni di spedizione e queste possono dipendere dal paese di consegna, dal prezzo di acquisto, dal peso e dalle dimensioni dell'articolo, dall'eventuale iscrizione alla piattaforma, dalla consegna diretta da parte della piattaforma o tramite un fornitore terzo (Marketplace), ecc. è possibile che le spese di spedizione indicate da eurolibro non corrispondano a quelle della piattaforma offerente.
Dati bibliografici del miglior libro corrispondente
Informazioni dettagliate del libro - Key Pre-distribution and Key Revocation in Wireless Sensor Networks
EAN (ISBN-13): 9783846557754 ISBN (ISBN-10): 3846557757 Copertina rigida Copertina flessibile Anno di pubblicazione: 2011 Editore: LAP LAMBERT Academic Publishing
Libro nella banca dati dal 2009-08-24T00:44:15+02:00 (Zurich) Pagina di dettaglio ultima modifica in 2022-08-17T17:20:54+02:00 (Zurich) ISBN/EAN: 9783846557754
ISBN - Stili di scrittura alternativi: 3-8465-5775-7, 978-3-8465-5775-4 Stili di scrittura alternativi e concetti di ricerca simili: Autore del libro : ashok, kumar, chattopadhyay Titolo del libro: wireless sensor networks