My Account Details

ISBN10: 0071399437 | ISBN13: 9780071399432

Chapter 1
Why is Wireless Different? Chapter 2
Wireless Information Warfare Chapter 3
Telephone System Vulnerabilities Chapter 4
Satellite Communications Chapter 5
Cryptographic Security Chapter 6
Speech Cryptology Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Wireless Information Warfare
Chapter 3
Telephone System Vulnerabilities Chapter 4
Satellite Communications Chapter 5
Cryptographic Security Chapter 6
Speech Cryptology Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Satellite Communications
Chapter 5
Cryptographic Security Chapter 6
Speech Cryptology Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Speech Cryptology
Chapter 7
The Wireless Local Area Network (WLAN) Chapter 8
Wireless Application Protocol (WAP) Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Wireless Application Protocol (WAP)
Chapter 9
Wireless Transport Layer Security (WTLS) Chapter 10
Bluetooth Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Bluetooth
Chapter 11
Voice Over Internet Protocol Chapter 12
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications
Chapter 13
Optimizing Wireless Security with FPGAs and ASICs Bibliography Index
Index
Need support? We're here to help - Get real-world support and resources every step of the way.