๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Wireless Security and Cryptography: Specifications and Implementations

โœ Scribed by Nicolas Sklavos, Xinmiao Zhang


Publisher
CRC Press
Year
2007
Tongue
English
Leaves
418
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state-of-the-art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.


๐Ÿ“œ SIMILAR VOLUMES


Quantum Cryptography and Computing : The
โœ R. Horodecki; S. Ya. Kilin; J. Kowalik ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› IOS Press, Incorporated ๐ŸŒ English

This volume contains papers presented at the NATO Advanced Research Workshop September 9-12, 2009, "Quantum Cryptography and Computing: Theory and Implementation", that was held in Sopot, Poland and organized by the National Quantum Information Centre of Gdansk. The papers are related to three broad

Cryptography and Network Security
โœ William Stallings ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Prentice Hall ๐ŸŒ English

The "Cryptography and Network Security (4th Edition)" book that I bought through Amazon was delivered timely. The book was also in the good condition that was said of it.

Computer Security and Cryptography
โœ Alan G. Konheim ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley-Interscience ๐ŸŒ English

<b>Gain the skills and knowledge needed to create effective data security systems <p> This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors

Computer Security and Cryptography
โœ Alan G. Konheim ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley-Interscience ๐ŸŒ English

Gain the skills and knowledge needed to create effective data security systemsThis book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect th