Wireless Security and Cryptography

Specifications and Implementations

Nonfiction, Science & Nature, Technology, Electricity, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book Wireless Security and Cryptography by , CRC Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781351838092
Publisher: CRC Press Publication: December 19, 2017
Imprint: CRC Press Language: English
Author:
ISBN: 9781351838092
Publisher: CRC Press
Publication: December 19, 2017
Imprint: CRC Press
Language: English

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.

Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications.

Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.

Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications.

Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

More books from CRC Press

Cover of the book Power Converters and AC Electrical Drives with Linear Neural Networks by
Cover of the book Ergonomics Analysis and Problem Solving Manual by
Cover of the book Clinical Applications of Magnetic Nanoparticles by
Cover of the book Molecular Plant Virology by
Cover of the book Handbook of Primary Care Ethics by
Cover of the book Metabolic Regulation and Metabolic Engineering for Biofuel and Biochemical Production by
Cover of the book Handbook of Quantile Regression by
Cover of the book Further Electrical and Electronic Principles by
Cover of the book Chromosomal Nonhistone Protein by
Cover of the book How to Cheat in Maya 2017 by
Cover of the book Digital Protective Relays by
Cover of the book Electrical Phenomena at Interfaces by
Cover of the book UX Style Frameworks by
Cover of the book Digital Logic Techniques by
Cover of the book Flood Inundation Modeling and Hazard Mapping under Uncertainty in the Sungai Johor Basin, Malaysia by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy