LEADER 01131nam a22002651i 4500 001 991002784649707536 005 20040325144755.0 008 040624s1930 fr |||||||||||||||||fre 035 $ab12977366-39ule_inst 035 $aARCHE-093504$9ExL 040 $aDip.to Beni Culturali$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a937 100 1 $aReinach, Salomon$0177489 245 10$aAmalthée :$bmélange d'archéologie et d'histoire /$cS. Reinach 260 $aParis :$bLeroux,$c1930- 300 $av. ;$c21 cm 440 0$aMemoriae fratrum 907 $a.b12977366$b02-04-14$c12-07-04 912 $a991002784649707536 945 $aLE001 AN XXI 1$g1$i2001000071012$lle001$nV. 1. - C. 1$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13581181$z12-07-04 945 $aLE001 AN XXI 1a$g1$i2001000070978$lle001$nV. 2. - C. 1$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13581193$z12-07-04 945 $aLE001 AN XXI 1b$g1$i2001000071005$lle001$nV. 3. - C. 1$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i1358120x$z12-07-04 996 $aAmalthée$9285080 997 $aUNISALENTO 998 $ale001$b12-07-04$cm$da $e-$ffre$gfr $h0$i3 LEADER 02846nam 2200661Ia 450 001 9910953825003321 005 20200520144314.0 010 $a6611733728 010 $a1-281-73372-5 010 $a9786611733728 010 $a1-4356-7867-2 010 $a1-60750-293-3 010 $a600-00-0606-3 010 $a1-4337-1227-X 035 $a(CKB)1000000000549452 035 $a(EBL)346208 035 $a(SSID)ssj0000272669 035 $a(PQKBManifestationID)11230158 035 $a(PQKBTitleCode)TC0000272669 035 $a(PQKBWorkID)10309573 035 $a(PQKB)10660174 035 $a(Au-PeEL)EBL346208 035 $a(CaPaEBR)ebr10231725 035 $a(CaONFJC)MIL173372 035 $a(MiAaPQ)EBC346208 035 $a(OCoLC)491261438 035 $a(EXLCZ)991000000000549452 100 $a20080324d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aWireless sensor network security /$fedited by Javier Lopez and Jianying Zhou 205 $a1st ed. 210 $aAmsterdam ;$aWashington, D.C. $cIOS Press$dc2008 215 $a1 online resource (320 p.) 225 1 $aCryptology and information security series ;$vv. 1 300 $aDescription based upon print version of record. 311 08$a1-58603-813-3 320 $aIncludes biblliographical references and index. 327 $aTitle page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation - Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index 330 $aWireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems. 410 0$aCryptology and information security series ;$vv. 1. 606 $aSensor networks$xSecurity measures 606 $aDetectors$xSecurity measures 615 0$aSensor networks$xSecurity measures. 615 0$aDetectors$xSecurity measures. 676 $a681/.2 701 $aLopez$b Javier$01096793 701 $aZhou$b Jianying$0846249 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910953825003321 996 $aWireless sensor network security$94382240 997 $aUNINA