Wireless Security and Cryptography

Specifications and Implementations
Fr. 156.00
ISBN: 978-0-8493-8771-5
+ -

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.

Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications.

Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

"?well organized and readable as a whole? Although some chapters describe the same security basics and algorithms, this is not a disadvantage because it allows each chapter to be read independently. ? recommended for university researchers and graduate students in computer science and information systems. Also, engineers, wireless system architects, and developers will find in it interesting and useful content. For professionals, each chapter includes extensive bibliographic notes. The fact that many security aspects are widely discussed is the great advantage of this book. It allows one not only to acquire general knowledge about security specifications and implementations, but also to find out particular security solutions in different environments. In my opinion, this book is worth recommendation because it presents the current status of wireless security and describes future directions." -Marcin Niemiec, in IEEE Communications Magazine, September 2008

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices.

Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications.

Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

"?well organized and readable as a whole? Although some chapters describe the same security basics and algorithms, this is not a disadvantage because it allows each chapter to be read independently. ? recommended for university researchers and graduate students in computer science and information systems. Also, engineers, wireless system architects, and developers will find in it interesting and useful content. For professionals, each chapter includes extensive bibliographic notes. The fact that many security aspects are widely discussed is the great advantage of this book. It allows one not only to acquire general knowledge about security specifications and implementations, but also to find out particular security solutions in different environments. In my opinion, this book is worth recommendation because it presents the current status of wireless security and describes future directions." -Marcin Niemiec, in IEEE Communications Magazine, September 2008
Autor Sklavos, Nicolas (Hrsg.) / Zhang, Xinmiao (Hrsg.) / Koufopavlou, Odysseas (Beitr.) / Hassler, Vesna (Beitr.) / Kitsos, Paris (Beitr.) / Mcloone, Maire (Beitr.) / Hamalainen, Panu (Beitr.) / Fournaris, Apostolos P. (Beitr.) / Rijmen, Vincent (Beitr.) / Pramstaller, Norbert (Beitr.) / Koc, Cetin K. (Beitr.) / Smyth, Neil (Beitr.) / Tawalbeh, Loai A. (Beitr.) / Ors, Siddika Berna (Beitr.) / Manninger, Martin (Beitr.)
Verlag Taylor and Francis
Einband Fester Einband
Erscheinungsjahr 2007
Seitenangabe 416 S.
Lieferstatus Lieferbar in ca. 10-20 Arbeitstagen
Ausgabekennzeichen Englisch
Abbildungen Farb., s/w. Abb.
Masse H23.4 cm x B15.6 cm x D2.7 cm 930 g
Coverlag CRC Press (Imprint/Brand)

Über den Autor Sklavos, Nicolas (Hrsg.)

Nicolas Sklavos is an Associate Professor, with the Computer Engineering & Informatics Department, Polytechnic School, University of Patras, Hellas.He holds an award for his PhD thesis on "VLSI Designs of Wireless Communications Security Systems", from IFIP VLSI SOC, Germany, 2003. He has been awarded with a post-doctoral research scholarship, from the National Scholarship Foundation.He has participated in a great number of European and National projects, with both research & management activities, funding by the European Commission or/and National resources.He also acts as a reviewer and evaluator for both European Commission Project Calls, and National Project Calls of several countries.He is Associate Editor of the Electrical & Computer Engineering Journal, Hindawi and Cryptography, ¿DPI Publisher. He was the Editor in Chief of Information Security Journal: a Global Perspective, Taylor Francis Group, from 2011 to 2014. He also served as Associate Editor of IEEE Transactions of Latin America, and Computers & Electrical Engineering Journal, Elsevier and Information Security Journal: a Global Perspective, Taylor Francis Group. He has been invited as Guest Editor of Special Issues of several publishers. He has been awarded as Top Associated Editor for 2010 and 2011, from Computers & Electrical Engineering Journal, Elsevier.He is an IEEE, Senior Member. From 2007 to 2014, he was the Council's Chair of IEEE Greece Young Professionals.He is an Associated Member of European Network of Excellence (HiPEAC). He is a member of the IFIP Working Group 11.3 on Data and Application Security and Privacy. He is also a member of International Association for Cryptologic Research (IACR), the Technical Chamber of Greece, and the Greek Electrical Engineering Society.He has participated in the committees of up to 300 conferences organized by IEEE, ACM, IFIP, as General, Program, Publication, etc, Chair, and with other roles.He has also authored/co-authored up to 250 scientific articles, published in journals, conferences, both books, books chapters, tutorials and technical reports, in the areas of his research. He has been invited as keynote speaker to several international conferences, workshops, summer schools etc.Recently, the results of his research, have received up to 1700 citations, in the scientific and technical literature.

Weitere Titel von Sklavos, Nicolas (Hrsg.)