Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs)
Wireless Personal Communications: An International Journal
Mobile Local Macropayments: Security and Prototyping
IEEE Pervasive Computing
Journal of Theoretical and Applied Electronic Commerce Research
Physical layer built-in security analysis and enhancement algorithms for CDMA systems
EURASIP Journal on Wireless Communications and Networking
Physical layer built-in security analysis and enhancement algorithms for CDMA systems
EURASIP Journal on Wireless Communications and Networking
The security in cognitive radio networks: a survey
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Speech Hashing Algorithm Based on Short-Time Stability
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part II
Threat description for the PP by using the concept of the assets protected by TOE
ICCS'03 Proceedings of the 2003 international conference on Computational science
Comparison of smart grid with cognitive radio: solutions to spectrum scarcity
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Hardware-software co-design of secure WLAN system for high throughput
WD'09 Proceedings of the 2nd IFIP conference on Wireless days
ICCOM'10 Proceedings of the 14th WSEAS international conference on Communications
Design of communication protocol for point to multi point network
CSECS '10 Proceedings of the 9th WSEAS international conference on Circuits, systems, electronics, control & signal processing
A secure and efficient communication resume protocol for secure wireless networks
DAIS'05 Proceedings of the 5th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Fast and secure communication resume protocol for wireless networks
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
Analysis of the power consumption of secure communication in wireless networks
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Security Challenges and Selected Legal Aspects for Wearable Computing
Journal of Information Technology Research
Hi-index | 0.00 |
Table of contents Chapter 1 Why is Wireless Different? Chapter 2 Wireless Information Warfare Chapter 3 Telephone System Vulnerabilities Chapter 4 Satellite Communications Chapter 5 Cryptographic Security Chapter 6 Speech Cryptology Chapter 7 The Wireless Local Area Network (WLAN) Chapter 8 Wireless Application Protocol (WAP) Chapter 9 Wireless Transport Layer Security (WTLS) Chapter 10 Bluetooth Chapter 11 Voice Over Internet Protocol Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13 Optimizing Wireless Security with FPGAs and ASICs Bibliography Index