Wireless Security and Cryptography: Specifications and Implementations
โ Scribed by Nicolas Sklavos, Xinmiao Zhang
- Publisher
- CRC Press
- Year
- 2007
- Tongue
- English
- Leaves
- 418
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state-of-the-art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.
๐ SIMILAR VOLUMES
This volume contains papers presented at the NATO Advanced Research Workshop September 9-12, 2009, "Quantum Cryptography and Computing: Theory and Implementation", that was held in Sopot, Poland and organized by the National Quantum Information Centre of Gdansk. The papers are related to three broad
The "Cryptography and Network Security (4th Edition)" book that I bought through Amazon was delivered timely. The book was also in the good condition that was said of it.
<b>Gain the skills and knowledge needed to create effective data security systems <p> This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors
Gain the skills and knowledge needed to create effective data security systemsThis book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect th