E-Book, Englisch, 416 Seiten
Sklavos / Zhang Wireless Security and Cryptography
Erscheinungsjahr 2017
ISBN: 978-0-8493-8769-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Specifications and Implementations
E-Book, Englisch, 416 Seiten
ISBN: 978-0-8493-8769-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.
Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications.
Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.
Zielgruppe
Electrical and computer engineers and scientists working in telecommunications, cryptography, information, and network security; algorithm design, cryptanalysis and hardware attacks, VLSI design, hardware design, circuits and systems, software and hardware co-design; senior or graduate level students studying engineering communications (wireless, digital), networks, security, algorithms, logic design, cryptography; companies with IP products related to security, or companies who'd like to include IP Security Core into their products.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Overview of Cryptographic Primitives for Secure
Communication, Palash Sarkar
Introduction to Communication Security, Vesna Hassler
Efficient VLSI Architectures for the Advanced Encryption
Standard Algorithm, Xinmiao Zhang
Hardware Design Issues in Elliptic Curve Cryptography
for Wireless Systems, Apostolos P. Fournaris and O. Koufopavlou
Efficient Elliptic Curve Cryptographic Hardware Design
for Wireless Security, Loai A. Tawalbeh and Cetin Kaya Koc
Cryptographic Algorithms in Constrained Environments, Vincent Rijmen and Norbert Pramstaller
Side-Channel Analysis Attacks on Hardware Implementations
of Cryptographic Algorithms, Siddika Berna Ors, Bart Preneel, and Ingrid Verbauwhede
Security Enhancement Layer for Bluetooth, Panu Hamalainen, Marko Hannikainen, and Timo D. Hamalainen
WLAN Security Processing Architectures, Neil Smyth, Maire McLoone, and John V. McCanny
Security Architecture and Implementation of the Universal Mobile
Telecommunication System, Paris Kitsos and Nicolas Sklavos
Wireless Application Protocol Security Processor: Privacy,
Authentication, and Data Integrity, Nicolas Sklavos
Binary Algorithms for Modular Inversion, Erkay Savas
Smart Card Technology, Martin Manninger
Index