rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780849387715

Wireless Security and Cryptography: Specifications and Implementations

by ;
  • ISBN13:

    9780849387715

  • ISBN10:

    084938771X

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2007-03-30
  • Publisher: CRC Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $135.00 Save up to $92.12
  • Rent Book $91.13
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Wireless Security and Cryptography: Specifications and Implementations [ISBN: 9780849387715] for the semester, quarter, and short term or search our site for other textbooks by Sklavos; Nicolas. Renting a textbook can save you up to 90% from the cost of buying.

Summary

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state-of-the-art research trends in implementations of wireless protocol security for current and future wireless communications.Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

Table of Contents

Overview of Cryptographic Primitives for SecureCommunication
Introduction to Communication Security
Efficient VLSI Architectures for the Advanced EncryptionStandard Algorithm
Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems
Efficient Elliptic Curve Cryptographic Hardware Design for Wireless Security
Cryptographic Algorithms in Constrained Environments
Side-Channel Analysis Attacks on Hardware Implementationsof Cryptographic Algorithms
Security Enhancement Layer for Bluetooth
WLAN Security Processing Architectures
Security Architecture and Implementation of the Universal MobileTelecommunication System
Wireless Application Protocol Security Processor: Privacy, Authentication, and Data Integrity
Binary Algorithms for Modular Inversion
Smart Card Technology
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program