Wireless security and cryptography : (Record no. 14321)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02034nam a2200181 a 4500 |
001 - CONTROL NUMBER | |
control field | ASIN084938771X |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190523072417.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130117s2007 xxu eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 084938771X (hardcover) |
Terms of availability | $109.95 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780849387715 (hardcover) |
245 10 - TITLE STATEMENT | |
Title | Wireless security and cryptography : |
Remainder of title | specifications and implementations / |
Statement of responsibility, etc. | Nicolas Sklavos, Xinmiao Zhang. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | [S.l.] : |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | 2007. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 416 p. ; |
Dimensions | 24 cm. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sklavos, Nicolas. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zhang, Xinmiao. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Amazon.com |
Uniform Resource Identifier | <a href="http://www.amazon.com/exec/obidos/ASIN/084938771X/chopaconline-20">http://www.amazon.com/exec/obidos/ASIN/084938771X/chopaconline-20</a> |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Checked out | Date last seen | Date last checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Department of Mechanical and Aerospace Engineering Library | Air University Central Library Islamabad | 01/17/2013 | 1 | 005.82 WIR | 000401 | 10/15/2019 | 10/15/2019 | 10/15/2019 | 01/17/2013 | Book |