
eBook - ePub
Wireless Security and Cryptography
Specifications and Implementations
- 416 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
About this book
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.
Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications.
Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Wireless Security and Cryptography by Nicolas Sklavos,Xinmiao Zhang in PDF and/or ePUB format, as well as other popular books in Technologie et ingénierie & Cybersécurité. We have over one million books available in our catalogue for you to explore.
Information
Table of contents
- Cover Page
- Title Page
- Copyright
- Dedication
- Editors
- Contributors
- Introduction
- Table of Contents
- Chapter 1 Overview of Cryptographic Primitives for Secure Communication
- Chapter 2 Introduction to Communication Security
- Chapter 3 Efficient VLSI Architectures for the Advanced Encryption Standard Algorithm
- Chapter 4 Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems
- Chapter 5 Efficient Elliptic Curve Cryptographic Hardware Design for Wireless Security
- Chapter 6 Cryptographic Algorithms in Constrained Environments
- Chapter 7 Side-Channel Attacks on Hardware Implementations of Cryptographic Algorithms
- Chapter 8 Security Enhancement Layer for Bluetooth
- Chapter 9 WLAN Security Processing Architectures
- Chapter 10 Security Architecture and Implementation of the Universal Mobile Telecommunication System
- Chapter 11 Wireless Application Protocol Security Processor: Privacy, Authentication, and Data Integrity
- Chapter 12 Binary Algorithms for Multiplicative Inversion
- Chapter 13 Smart Card Technology
- Index