Cantitate/Preț
Produs

Wireless Security and Cryptography: Specifications and Implementations

Editat de Nicolas Sklavos, Xinmiao Zhang
en Limba Engleză Hardback – 30 mar 2007
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.

Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications.

Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.
Citește tot Restrânge

Preț: 86856 lei

Preț vechi: 126729 lei
-31% Nou

Puncte Express: 1303

Preț estimativ în valută:
16623 17537$ 13853£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780849387715
ISBN-10: 084938771X
Pagini: 416
Ilustrații: 191 equations; 5 Halftones, black and white; 40 Tables, black and white; 114 Illustrations, black and white
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.93 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press

Public țintă

Professional

Cuprins

Overview of Cryptographic Primitives for Secure Communication. Introduction to Communication Security. Efficient VLSI Architectures for the Advanced Encryption Standard Algorithm. Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems. Efficient Elliptic Curve Cryptographic Hardware Design for Wireless Security. Cryptographic Algorithms in Constrained Environments. Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms. Security Enhancement Layer for Bluetooth. WLAN Security Processing Architectures. Security Architecture and Implementation of the Universal Mobile Telecommunication System. Wireless Application Protocol Security Processor: Privacy, Authentication, and Data Integrity. Binary Algorithms for Modular Inversion. Smart Card Technology. Index.

Recenzii

"…well organized and readable as a whole… Although some chapters describe the same security basics and algorithms, this is not a disadvantage because it allows each chapter to be read independently. … recommended for university researchers and graduate students in computer science and information systems. Also, engineers, wireless system architects, and developers will find in it interesting and useful content. For professionals, each chapter includes extensive bibliographic notes. The fact that many security aspects are widely discussed is the great advantage of this book. It allows one not only to acquire general knowledge about security specifications and implementations, but also to find out particular security solutions in different environments. In my opinion, this book is worth recommendation because it presents the current status of wireless security and describes future directions."
—Marcin Niemiec, in IEEE Communications Magazine, September 2008

Notă biografică

Nicolas Sklavos received a Ph.D. in electrical and computer engineering and a diploma in electrical and computer engineering in 2004 and 2000, respectively, both from the Electrical and Computer Engineering Department, University of Patras, Greece. In 2005, he joined the Telecommunications Systems and Networks Department of the Technological Educational Institute of Messolonghi, Nafpaktos, Greece, where he works as an assistant professor. His research interests include security and privacy, wireless communications security, and mobile networks. He holds an award for his Ph.D. thesis on ‘‘VLSI Designs o fWireless Communications Security Systems,’’ from IFIP VLSI SOC, Germany (2003). He has also contributed to international journals and participated in the organization of conferences, as program committee and guest editor. Dr. Sklavos is a member of the IEEE, IEE, the Technical Chamber of Greece, and the Greek Electrical Engineering Society. He has authored and coauthored up to 90 scientific articles, books and book chapters, reviews, and technical reports in the areas of his research. He can be contacted at nsklavos@ieee.org.
Xinmiao Zhang received B.S. and M.S. degrees in electrical engineering from Tianjin University, Tianjin, China, in 1997 and 2000, respectively. She received a Ph.D. in electrical engineering from the University of Minnesota–Twin Cities, in 2005. Since then, she has been with Case Western Reserve University, where she is currently a Timothy E. and Allison L. Schroeder Assistant Professor in the Department of Electrical Engineering and Computer Science. Her research interests include efficient VLSI architecture design for communications, cryptosystems, and digital signal processing. Dr. Zhang is the recipient of the Best Paper Award at ACM Great Lake Symposium on VLSI 2004. She also won the first prize in the Student Paper Contest at the Asilomar Conference on Signals, Systems, and Computers 2004. She is a member of the IEEE.

Descriere

This reference explores the latest technologies and applications needed to overcome security issues in wireless and handheld communications devices. While several books on the market cover similar topics, this handbook is unique in its treatment of specification and implementation aspects, including hardware design techniques. It provides broader coverage than many other books and covers recent research directions in the field. This book also proposes efficient and novel methods to implement security schemes in wireless protocols with high performance. It provides the state of the art in implementation of wireless protocol security for current and future wireless communications.