Wireless security and cryptography specifications and implementations

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless pr...

Full description

Saved in:
Bibliographic Details
Other Authors: Sklavos, Nicolas, Zhang, Xinmiao
Format: Book
Language:English
Published: Boca Raton, FL CRC Press 2007
©2007
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-374108
005 2020522123217
008 200622 2007 -US #|| #|00 #eng#D
020 # # |a 9780849387715  |q hardback 
020 # # |a 084938771X  |q hardback 
040 # # |a DLC  |d UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5103.2  |b .W57415 2007 
245 1 0 |a Wireless security and cryptography  |b specifications and implementations  |c edited by Nicolas Sklavos, Xinmiao Zhang 
264 # 1 |a Boca Raton, FL  |b CRC Press  |c 2007 
264 # 1 |c ©2007 
300 # # |a 400 pages  |b illustrations  |c 25 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references and index 
520 # # |a As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field. 
650 # 0 |a Wireless communication systems  |x Security measures 
650 # 0 |a Cryptography 
700 1 # |a Sklavos, Nicolas 
700 # # |a Zhang, Xinmiao 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=374108 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||01700##a0011.2.2||