Registro Completo |
Biblioteca(s): |
Embrapa Unidades Centrais. |
Data corrente: |
12/04/2012 |
Data da última atualização: |
12/04/2012 |
Autoria: |
SKLAVOS, N.; ZHANG, X. (ed.). |
Afiliação: |
NICOLAS SKLAVOS; XINMIAO ZHANG. |
Título: |
Wireless security and cryptography: specifications and implementations. |
Ano de publicação: |
2007 |
Fonte/Imprenta: |
London: Taylor & Francis, 2007. |
Páginas: |
400 p. |
ISBN: |
0-8493-8771-X |
Idioma: |
Inglês |
Conteúdo: |
Overview of cryptographic primitives for secure; Introduction to communication security; Efficient VLSI architectures for the advanced encryption; Hardware design issues in elliptic curve cryptography; Efficient elliptic curve cryptographic hardware design; Cryptographic algorithms in constrained environments; Side channel analysis attacks on hardware implementations; Security enhancement layer for bluetooh; WLAN security processing architectures; Security architecture and implementation of the universal mobile telecommunication system; Wireless application protocol security processor: privacy, authentication, and data integrity; Binary algorithms for multiplicative inversion; Smart card technology. |
Palavras-Chave: |
Criptografia; Segurança da informação. |
Thesaurus Nal: |
Internet. |
Categoria do assunto: |
-- |
Marc: |
LEADER 01186nam a2200181 a 4500 001 1922199 005 2012-04-12 008 2007 bl uuuu 00u1 u #d 020 $a0-8493-8771-X 100 1 $aSKLAVOS, N. 245 $aWireless security and cryptography$bspecifications and implementations. 260 $aLondon: Taylor & Francis$c2007 300 $a400 p. 520 $aOverview of cryptographic primitives for secure; Introduction to communication security; Efficient VLSI architectures for the advanced encryption; Hardware design issues in elliptic curve cryptography; Efficient elliptic curve cryptographic hardware design; Cryptographic algorithms in constrained environments; Side channel analysis attacks on hardware implementations; Security enhancement layer for bluetooh; WLAN security processing architectures; Security architecture and implementation of the universal mobile telecommunication system; Wireless application protocol security processor: privacy, authentication, and data integrity; Binary algorithms for multiplicative inversion; Smart card technology. 650 $aInternet 653 $aCriptografia 653 $aSegurança da informação 700 1 $aZHANG, X.
Download
Esconder MarcMostrar Marc Completo |
Registro original: |
Embrapa Unidades Centrais (AI-SEDE) |