Text
Wireless Security; Models, Threats, and Solutions
Contents
1. Why is Wireless Different?
2. Wireless Information Warfare
3. Telephone System Vulnerabilities
4. Satelite Communications
5. Cryptographic Security
6. Speech Criptology
7. The Wireless Local Area Network (WLAN)
8. Wireless Applications Protocol (WAP)
9. Wireless Transport Layer Security (WTLS)
10.Bluetooth
11.Voice Over Internet Protocol
12.Hardware Perspectives For End-to-End Security (E2E) in Wireless Applications
13.Optimizing Wireless Security with FPGas and ASICs
No other version available