Wireless Communications Security
Seiten
2005
Artech House Publishers (Verlag)
978-1-58053-520-5 (ISBN)
Artech House Publishers (Verlag)
978-1-58053-520-5 (ISBN)
Addressing the growing need to integrate effective security features into wireless communication systems, this book offers an overview of wireless security, as well the technical 'know-how' practitioners need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks.
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. The book provides expert guidance on how to evaluate cryptography deployment impact on current wireless network architectures and implement an effective cryptography architecture for any organization. This forward-looking resource offers the technical know-how practitioners need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks.
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. The book provides expert guidance on how to evaluate cryptography deployment impact on current wireless network architectures and implement an effective cryptography architecture for any organization. This forward-looking resource offers the technical know-how practitioners need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks.
Hideki Imai is a full professor in the Institute of Industrial Science. University of Tokyo. Dr. Imai is the author/coauthor of 35 books and is a renowned speaker at conferences worldwide. He received his B.E., M.E. and Ph.D. in electrical engineering from the University of Tokyo.
Cryptography. Security Features in Wireless. Authentication/Authorization/Accounting. Security in GSM. Security in 3G Systems and 4G Systems. PKI in Wireless (WPKI). Wireless Application Protocol (WAP).
Erscheint lt. Verlag | 30.11.2005 |
---|---|
Zusatzinfo | 1, black & white illustrations |
Verlagsort | Norwood |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 454 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Technik ► Nachrichtentechnik | |
ISBN-10 | 1-58053-520-8 / 1580535208 |
ISBN-13 | 978-1-58053-520-5 / 9781580535205 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Wie Geheimdienste und Kriminelle uns im Netz infiltrieren
Buch | Hardcover (2023)
Wiley-VCH (Verlag)
24,99 €
Konzepte – Verfahren – Protokolle
Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95 €