About this book
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers you a broad overview of wireless security, so you can choose the methods and techniques that are most appropriate for your projects. You gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. You discover how to evaluate cryptography deployment impact on current wireless network architectures, and learn how to implement an effective cryptography architecture for any organization. The book offers the technical know-how you need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks. Moreover, this highly practical reference shows you how to implement an authentication technique that helps the user roam in different networks while maintaining the role symmetry of the message structure in intra domain and inter domain environments. Additionally, the book discusses the wireless application protocol (WAP), explaining how the protocol works and how to select appropriate cryptographic modules for this technology.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Wireless Communications Security
