Wireless Security: Models, Threats, and Solutions

  • Authors:
  • Randall K. Nichols;Panos Lekkas

  • Affiliations:
  • -;-

  • Venue:
  • Wireless Security: Models, Threats, and Solutions
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Table of contents Chapter 1 Why is Wireless Different? Chapter 2 Wireless Information Warfare Chapter 3 Telephone System Vulnerabilities Chapter 4 Satellite Communications Chapter 5 Cryptographic Security Chapter 6 Speech Cryptology Chapter 7 The Wireless Local Area Network (WLAN) Chapter 8 Wireless Application Protocol (WAP) Chapter 9 Wireless Transport Layer Security (WTLS) Chapter 10 Bluetooth Chapter 11 Voice Over Internet Protocol Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13 Optimizing Wireless Security with FPGAs and ASICs Bibliography Index