000 | 01596nam a2200325 i 4500 | ||
---|---|---|---|
999 |
_c40453 _d40453 |
||
001 | 34326 | ||
003 | BD-DhAAL | ||
005 | 20211110164833.0 | ||
008 | 190321t2019 flua b 001 0 eng | ||
010 | _a 2018023409 | ||
020 | _a9781138318632 (pbk. : acidfree paper) | ||
020 | _a9781138341364 (hardback : acidfree paper) | ||
020 | _z9780429454448 (ebook) | ||
040 |
_aDLC _beng _cDLC _erda _dDLC _dBD-DhAAL |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.8857 _b.P38 2019 |
082 | 0 | 0 |
_a005.8 _223 |
100 | 1 |
_aPatel, Chintan, _eauthor. _930343 |
|
245 | 1 | 0 |
_aInternet of things security : _bchallenges, advances and analytics / _cChintan Patel and Nishant Doshi. |
260 |
_aBoca Raton : _bCRC Press, Taylor & Francis Group, _cc2019 |
||
300 |
_axxi, 238 pages : _billustrations ; _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | _a1. Internet of Things: An Overview. 2. A Mathematical Foundation. 3. IoT Authentication. 4. Single-Server Authentication. 5. Multi-Server Authentication Schemes. 6. Attacks and Remedies. 7. Analytical Matrices and Tools. 8. Future Work and Conclusion. | ||
520 | _aThis book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms to secure the Internet of Things. It also include mathematics from basic level to advance level required for security-- | ||
526 | _aCSE | ||
650 | 0 |
_aInternet of things _xSecurity measures. _930344 |
|
650 | 0 |
_aComputer science. _942494 |
|
700 | 1 |
_aDoshi, Nishant, _eauthor. _930345 |
|
852 |
_aAyesha Abed Library _cGeneral Stacks |
||
942 |
_2ddc _cBK |