|
![]() |
|||
|
||||
OverviewAs the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field. Full Product DetailsAuthor: Nicolas Sklavos (Technological Educational Institute of Patras, Greece) , Xinmiao Zhang (Case Western Reserve University, Cleveland, Ohio, USA) , Odysseas Koufopavlou (University of Patras, Greece University of Patras, Greece) , Xinmiao Zhang (Case Western Reserve University, Cleveland, Ohio, USA)Publisher: Taylor & Francis Inc Imprint: CRC Press Inc Dimensions: Width: 15.60cm , Height: 2.70cm , Length: 23.40cm Weight: 0.930kg ISBN: 9780849387715ISBN 10: 084938771 Pages: 416 Publication Date: 30 March 2007 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviews...well organized and readable as a whole... Although some chapters describe the same security basics and algorithms, this is not a disadvantage because it allows each chapter to be read independently. ... recommended for university researchers and graduate students in computer science and information systems. Also, engineers, wireless system architects, and developers will find in it interesting and useful content. For professionals, each chapter includes extensive bibliographic notes. The fact that many security aspects are widely discussed is the great advantage of this book. It allows one not only to acquire general knowledge about security specifications and implementations, but also to find out particular security solutions in different environments. In my opinion, this book is worth recommendation because it presents the current status of wireless security and describes future directions. -Marcin Niemiec, in IEEE Communications Magazine, September 2008 ...well organized and readable as a whole... Although some chapters describe the same security basics and algorithms, this is not a disadvantage because it allows each chapter to be read independently. ... recommended for university researchers and graduate students in computer science and information systems. Also, engineers, wireless system architects, and developers will find in it interesting and useful content. For professionals, each chapter includes extensive bibliographic notes. The fact that many security aspects are widely discussed is the great advantage of this book. It allows one not only to acquire general knowledge about security specifications and implementations, but also to find out particular security solutions in different environments. In my opinion, this book is worth recommendation because it presents the current status of wireless security and describes future directions. -Marcin Niemiec, in IEEE Communications Magazine, September 2008 Author InformationUniversity of Patras, Greece Case Western Reserve University, Cleveland, Ohio, USA Tab Content 6Author Website:Countries AvailableAll regions |