Related Books
Language: en
Pages: 526
Pages: 526
Type: BOOK - Published: 2017-12-19 - Publisher: CRC Press
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing syst
Language: en
Pages: 418
Pages: 418
Type: BOOK - Published: 2017-12-19 - Publisher: CRC Press
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing syst
Language: en
Pages: 310
Pages: 310
Type: BOOK - Published: 2003 - Publisher: Addison-Wesley Professional
Before wireless commerce, or even wireless access to the corporate network can really take off, organizations are going to have to improve their efforts in wire
Language: en
Pages: 708
Pages: 708
Type: BOOK - Published: 2002 - Publisher: McGraw Hill Professional
Nichols and Lekkas uncover the threats and vunerablilities unique to the wireless communication, telecom, broadband, and satellite markets. They provide an over
Language: en
Pages: 235
Pages: 235
Type: BOOK - Published: 2013-03-21 - Publisher: CRC Press
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts