000 | 03505nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-030-20816-5 | ||
003 | DE-He213 | ||
005 | 20220801214709.0 | ||
007 | cr nn 008mamaa | ||
008 | 190611s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030208165 _9978-3-030-20816-5 |
||
024 | 7 |
_a10.1007/978-3-030-20816-5 _2doi |
|
050 | 4 | _aTK5103.2-.4885 | |
072 | 7 |
_aTJKW _2bicssc |
|
072 | 7 |
_aTEC061000 _2bisacsh |
|
072 | 7 |
_aTJKW _2thema |
|
082 | 0 | 4 |
_a621.384 _223 |
100 | 1 |
_aShankar, K. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _939899 |
|
245 | 1 | 0 |
_aSecure Image Transmission in Wireless Sensor Network (WSN) Applications _h[electronic resource] / _cby K. Shankar, Mohamed Elhoseny. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aX, 161 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1119 ; _v564 |
|
505 | 0 | _aIntroduction -- An Optimal Light Weight Cryptography - SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks -- An Optimal Haar Wavelet with Light Weight Cryptography based Secret Data Hiding on Digital Images in Wireless Sensor Networks. | |
520 | _aThis book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a “must-read” guide to the subject matter. | ||
650 | 0 |
_aWireless communication systems. _93474 |
|
650 | 0 |
_aMobile communication systems. _94051 |
|
650 | 0 |
_aComputational intelligence. _97716 |
|
650 | 1 | 4 |
_aWireless and Mobile Communication. _939900 |
650 | 2 | 4 |
_aComputational Intelligence. _97716 |
700 | 1 |
_aElhoseny, Mohamed. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _939901 |
|
710 | 2 |
_aSpringerLink (Online service) _939902 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030208158 |
776 | 0 | 8 |
_iPrinted edition: _z9783030208172 |
776 | 0 | 8 |
_iPrinted edition: _z9783030208189 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1119 ; _v564 _939903 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-20816-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c76646 _d76646 |