Wireless security and cryptography specifications and implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless pr...
Saved in:
Other Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton, FL
CRC Press
2007
©2007 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-374108 | ||
005 | 2020522123217 | ||
008 | 200622 2007 -US #|| #|00 #eng#D | ||
020 | # | # | |a 9780849387715 |q hardback |
020 | # | # | |a 084938771X |q hardback |
040 | # | # | |a DLC |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5103.2 |b .W57415 2007 |
245 | 1 | 0 | |a Wireless security and cryptography |b specifications and implementations |c edited by Nicolas Sklavos, Xinmiao Zhang |
264 | # | 1 | |a Boca Raton, FL |b CRC Press |c 2007 |
264 | # | 1 | |c ©2007 |
300 | # | # | |a 400 pages |b illustrations |c 25 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references and index |
520 | # | # | |a As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field. |
650 | # | 0 | |a Wireless communication systems |x Security measures |
650 | # | 0 | |a Cryptography |
700 | 1 | # | |a Sklavos, Nicolas |
700 | # | # | |a Zhang, Xinmiao |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=374108 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||01700##a0011.2.2|| |