Related Books
Language: en
Pages: 235
Pages: 235
Type: BOOK - Published: 2013-03-21 - Publisher: CRC Press
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts
Language: en
Pages: 272
Pages: 272
Type: BOOK - Published: 2009 - Publisher: IOS Press
"What if your public key was not some random-looking bit string, but simply your name or email address? This idea, put forward by Adi Shamir back in 1984, still
Language: en
Pages: 3318
Pages: 3318
Type: BOOK - Published: 2013-09-03 - Publisher: Trans Tech Publications Ltd
Selected, peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI 2013), July 23-24, 2013, Z
Language: en
Pages: 1924
Pages: 1924
Type: BOOK - Published: 2020-09-30 - Publisher: IGI Global
Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become i
Language: en
Pages: 246
Pages: 246
Type: BOOK - Published: 2014-02-06 - Publisher: CRC Press
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc netwo