Wireless security and cryptography specifications and implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless pr...
Saved in:
Other Authors: | Sklavos, Nicolas, Zhang, Xinmiao |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton, FL
CRC Press
2007
©2007 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Wireless security
by: Osterhage, Wolfgang
Published: (2012) -
Wireless communications security
by: Imai, Hideki 1943-
Published: (2006) -
Guide to wireless network security
by: Vacca, John R.
Published: (2006) -
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny
Published: (2010) -
Wireless and mobile device security
by: Doherty, Jim 1968-
Published: (2016)