An optimal low-power/high performance DDP-based Cobra-H64 cipher
Proceedings of the 3rd international conference on Mobile multimedia communications
Full custom low-power/high performance DDP-based Cobra-H64 cipher
Computers and Electrical Engineering
Efficient architectures for elliptic curve cryptography processors for RFID
ICCD'09 Proceedings of the 2009 IEEE international conference on Computer design
An approach to secure wireless communications using randomized eigenvector-based jamming signals
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Comparison of smart grid with cognitive radio: solutions to spectrum scarcity
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Improved security for commercial container transports using an innovative active RFID system
Journal of Network and Computer Applications
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
Analysis and improvement of an authenticated multiple key exchange protocol
Computers and Electrical Engineering
Computers and Electrical Engineering
Transactions on computational science XI
An SVD audio watermarking approach using chaotic encrypted images
Digital Signal Processing
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
Security and Communication Networks
Threshold visual secret sharing by random grids with improved contrast
Journal of Systems and Software
Hi-index | 0.00 |
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state-of-the-art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.