14 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Brand NewBrand New
Internet of Things Security : Challenges, Advances, and Analytics, Paperback by Patel, Chintan; Doshi, Nishant, ISBN 1138318639, ISBN-13 9781138318632, Brand New, Free shipping in the US This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms to secure the Internet of Things. It also include mathematics from basic level to advance level required for security.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
About this product
Product Identifiers
PublisherAuerbach Publishers, Incorporated
ISBN-101138318639
ISBN-139781138318632
eBay Product ID (ePID)15038852751
Product Key Features
Number of Pages240 Pages
Publication NameInternet of Things Security : Challenges, Advances, and Analytics
LanguageEnglish
Publication Year2018
SubjectMobile & Wireless Communications, Security / General, Security / Networking, Information Technology
TypeTextbook
Subject AreaComputers, Technology & Engineering
AuthorChintan Patel, Nishant Doshi
FormatHardcover
Dimensions
Item Height0.6 in
Item Weight12.8 Oz
Item Length9.2 in
Item Width6.3 in
Additional Product Features
Intended AudienceCollege Audience
LCCN2018-023409
IllustratedYes
Table Of Content1. Internet of Things: An Overview. 2. A Mathematical Foundation. 3. IoT Authentication. 4. Single-Server Authentication. 5. Multi-Server Authentication Schemes. 6. Attacks and Remedies. 7. Analytical Matrices and Tools. 8. Future Work and Conclusion.
SynopsisMost of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.