1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

wireless security and cryptography specifications and implementations

418 12 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Free ebooks ==> www.Ebook777.com www.Ebook777.com Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page i 8.2.2007 12:34pm Wireless Security and Cryptography Specifications and Implementations Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page ii 8.2.2007 12:34pm Free ebooks ==> www.Ebook777.com www.Ebook777.com Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page iii 8.2.2007 12:34pm Edited by Nicolas Sklavos Xinmiao Zhang Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page iv 8.2.2007 12:34pm Free ebooks ==> www.Ebook777.com CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2007 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S Government works Printed in the United States of America on acid-free paper 10 International Standard Book Number-10: 0-8493-8771-X (Hardcover) International Standard Book Number-13: 978-0-8493-8771-5 (Hardcover) This book contains information obtained from authentic and highly regarded sources Reprinted material is quoted with permission, and sources are indicated A wide variety of references are listed Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers For permission to photocopy or use material electronically from this work, please access www copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400 CCC is a not-for-profit organization that provides licenses and registration for a variety of users For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe Library of Congress Cataloging-in-Publication Data Wireless security and cryptography : specifications and implementations / edited by Nicolas Sklavos and Xinmiao Zhang p cm Includes bibliographical references and index ISBN-13: 978-0-8493-8771-5 ISBN-10: 0-8493-8771-X Wireless communication systems Security measures Cryptography I Sklavos, Nicolas II Zhang, Xinmiao III Title TK5103.2.W57415 2007 005.8 dc22 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com www.Ebook777.com 2006100063 Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page v 8.2.2007 12:34pm Dedication To my family and to all my teachers — Dr Nicolas Sklavos To Ruoyu and my parents — Dr Xinmiao Zhang Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page vi 8.2.2007 12:34pm Free ebooks ==> www.Ebook777.com www.Ebook777.com Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page vii 8.2.2007 12:34pm Editors Nicolas Sklavos received a Ph.D in electrical and computer engineering and a diploma in electrical and computer engineering in 2004 and 2000, respectively, both from the Electrical and Computer Engineering Department, University of Patras, Greece In 2005, he joined the Telecommunications Systems and Networks Department of the Technological Educational Institute of Messolonghi, Nafpaktos, Greece, where he works as an assistant professor His research interests include security and privacy, wireless communications security, and mobile networks He holds an award for his Ph.D thesis on ‘‘VLSI Designs of Wireless Communications Security Systems,’’ from IFIP VLSI SOC, Germany (2003) He has also contributed to international journals and participated in the organization of conferences, as program committee and guest editor Dr Sklavos is a member of the IEEE, IEE, the Technical Chamber of Greece, and the Greek Electrical Engineering Society He has authored and coauthored up to 90 scientific articles, books and book chapters, reviews, and technical reports in the areas of his research He can be contacted at nsklavos@ieee.org Xinmiao Zhang received B.S and M.S degrees in electrical engineering from Tianjin University, Tianjin, China, in 1997 and 2000, respectively She received a Ph.D in electrical engineering from the University of Minnesota– Twin Cities, in 2005 Since then, she has been with Case Western Reserve University, where she is currently a Timothy E and Allison L Schroeder Assistant Professor in the Department of Electrical Engineering and Computer Science Her research interests include efficient VLSI architecture design for communications, cryptosystems, and digital signal processing Dr Zhang is the recipient of the Best Paper Award at ACM Great Lake Symposium on VLSI 2004 She also won the first prize in the Student Paper Contest at the Asilomar Conference on Signals, Systems, and Computers 2004 She is a member of the IEEE Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page viii 8.2.2007 12:34pm Free ebooks ==> www.Ebook777.com www.Ebook777.com Nicolas Sklavos/Wireless Security and Cryptography 8771_C000 Final Proof page ix 8.2.2007 12:34pm Contributors Apostolos P Fournaris Electrical and Computer Engineering Department University of Patras Patras, Greece C ¸ etin Kaya Koc¸ School of Electrical Engineering and Computer Science Oregon State University Corvallis, Oregon and Panu Haămaălaăinen Nokia Technology Platforms Tampere, Finland and Institute of Digital and Computer Systems Tampere University of Technology Tampere, Finland Timo D Haămaălaăinen Institute of Digital and Computer Systems Tampere University of Technology Tampere, Finland Marko Haănnikaăinen Institute of Digital and Computer Systems Tampere University of Technology Tampere, Finland Vesna Hassler European Patent Office Sub-office Vienna Vienna, Austria Paris Kitsos School of Science and Technology Hellenic Open University Patras, Greece Istanbul Commerce University Istanbul, Turkey O Koufopavlou Electrical and Computer Engineering Department University of Patras Patras, Greece Martin Manninger Austria Card GmbH Vienna, Austria John V McCanny The Institute of Electronics, Communications and Information Technology (ECIT) Queen’s University Belfast Belfast, Northern Ireland Maire McLoone The Institute of Electronics, Communications and Information Technology (ECIT) Queens University Belfast Belfast, Northern Ireland ă rs Siddika Berna O Department of Electronics and Communication Engineering Istanbul Technical University Istanbul, Turkey ... Sklavos /Wireless Security and Cryptography 8771_C000 Final Proof page i 8.2.2007 12:34pm Wireless Security and Cryptography Specifications and Implementations Nicolas Sklavos /Wireless Security and Cryptography. .. trademarks, and are used only for identification and explanation without intent to infringe Library of Congress Cataloging-in-Publication Data Wireless security and cryptography : specifications and implementations. .. support the needs of security and cryptography However, the software solution is not acceptable in the case of handheld devices and Nicolas Sklavos /Wireless Security and Cryptography 8771_C000

Ngày đăng: 17/09/2021, 15:41

Xem thêm:

Mục lục

    Chapter 1. Overview of Cryptographic Primitives for Secure Communication

    Chapter 2. Introduction to Communication Security

    Chapter 3. Efficient VLSI Architectures for the Advanced Encryption Standard Algorithm

    Chapter 4. Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems

    Chapter 5. Efficient Elliptic Curve Cryptographic Hardware Design for Wireless Security

    Chapter 6. Cryptographic Algorithms in Constrained Environments

    Chapter 7. Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms

    Chapter 8. Security Enhancement Layer for Bluetooth

    Chapter 9. WLAN Security Processing Architectures

    Chapter 10. Security Architecture and Implementation of the Universal Mobile Telecommunication System

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN