Details
Title | Cryptographic security solutions for the Internet of Things |
---|---|
Other creators | Banday Mohammad Tariq |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Internet of things — Security measures. ; Cryptography. ; COMPUTERS / Security / General. ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1083671389 |
Record create date | 1/31/2019 |
Allowed Actions
pdf/2013198.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/2013198.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Title Page
- Copyright Page
- Book Series
- Editorial Advisory Board
- Table of Contents
- Detailed Table of Contents
- Foreword
- Preface
- Acknowledgment
- Section 1: Introduction
- Chapter 1: Security in Context of the Internet of Things
- Section 2: Encryption and Cryptography
- Chapter 2: Encryption Principles and Techniques for the Internet of Things
- Chapter 3: A Review of Cryptographic Algorithms for the Internet of Things
- Section 3: Security Protocols
- Chapter 4: Addressing Security Issues of the Internet of Things Using Physically Unclonable Functions
- Chapter 5: Hardware Primitives-Based Security Protocols for the Internet of Things
- Chapter 6: Secure Computation of Private Set Intersection Cardinality With Linear Complexity
- Chapter 7: A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET
- Chapter 8: Preserving Security of Mobile Anchors Against Physical Layer Attacks
- Chapter 9: An Adaptive Security Framework for the Internet of Things Applications Based on the Contextual Information
- Section 4: Social/Legal Issues and Forensics
- Chapter 10: Emerging Social and Legal Issues of the Internet of Things
- Chapter 11: Digital Forensics in the Context of the Internet of Things
- Compilation of References
- About the Contributors
- Index