|
Showing 1 - 3 of
3 matches in All Departments
As the use of wireless devices becomes widespread, so does the need
for strong and secure transport protocols. Even with this
intensified need for securing systems, using cryptography does not
seem to be a viable solution due to difficulties in implementation.
The security layers of many wireless protocols use outdated
encryption algorithms, which have proven unsuitable for hardware
usage, particularly with handheld devices. Summarizing key issues
involved in achieving desirable performance in security
implementations, Wireless Security and Cryptography: Specifications
and Implementations focuses on alternative integration approaches
for wireless communication security. It gives an overview of the
current security layer of wireless protocols and presents the
performance characteristics of implementations in both software and
hardware. This resource also presents efficient and novel methods
to execute security schemes in wireless protocols with high
performance. It provides the state of the art research trends in
implementations of wireless protocol security for current and
future wireless communications. Unique in its coverage of
specification and implementation concerns that include hardware
design techniques, Wireless Security and Cryptography:
Specifications and Implementations provides thorough coverage of
wireless network security and recent research directions in the
field.
|
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, …
|
R1,541
Discovery Miles 15 410
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the Second International Workshop on Information & Operational
Technology (IT & OT) security systems, IOSec 2019 , the First
International Workshop on Model-driven Simulation and Training
Environments, MSTEC 2019, and the First International Workshop on
Security for Financial Critical Infrastructures and Services,
FINSEC 2019, held in Luxembourg City, Luxembourg, in September
2019, in conjunction with the 24th European Symposium on Research
in Computer Security, ESORICS 2019. The IOSec Workshop received 17
submissions from which 7 full papers were selected for
presentation. They cover topics related to security architectures
and frameworks for enterprises, SMEs, public administration or
critical infrastructures, threat models for IT & OT systems and
communication networks, cyber-threat detection, classification and
pro ling, incident management, security training and awareness,
risk assessment safety and security, hardware security,
cryptographic engineering, secure software development, malicious
code analysis as well as security testing platforms. From the MSTEC
Workshop 7 full papers out of 15 submissions are included. The
selected papers deal focus on the verification and validation
(V&V) process, which provides the operational community with
confidence in knowing that cyber models represent the real world,
and discuss how defense training may benefit from cyber models. The
FINSEC Workshop received 8 submissions from which 3 full papers and
1 short paper were accepted for publication. The papers reflect the
objective to rethink cyber-security in the light of latest
technology developments (e.g., FinTech, cloud computing,
blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first
services, mobile payments).
|
Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Apostolos P. Fournaris, Konstantinos Lampropoulos, Eva Marin Tordera
|
R1,539
Discovery Miles 15 390
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the First
International Workshop, IOSec 2018, sponsored by CIPSEC, held in
Heraklion, Crete, Greece, in September 2018. The 12 full papers
presented were carefully reviewed and selected from 22 submissions.
They were organized in topical sections named: Critical
Infrastructure Cybersecurity Issues; CyberSecurity Threats,
Assessment and Privacy; and Vulnerability and Malware Detection.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
(1)
R51
Discovery Miles 510
|