Wireless Security: Models, Threats, and Solutions
Everybody's connected. Everybody's wired. Everybody's talking. Nobody is secure. In 2001, 90 per cent of business surveyed by the FBI reported breaches of their communication systems, showing that we are only just begining to understand how porous wireless systems are. This book uncovers the threats and vunerablilities unique to wireless communication and other solutions for telecom, broadband, satellite, and other emerging markets. It also helps you plan application-aware cryptographic tactics, plot your realistic defenses, and review the commercial solutions currently on the market.
1 page matching companding a-b-clark pcm in this book
What people are saying - Write a review
We haven't found any reviews in the usual places.
algorithm analog applications architecture ASIC attack authentication band bandwidth base station bits block cipher Bluetooth CDMA cell channel chip ciphertext circuit configuration cryptanalysis cryptographic cryptosystems decryption digital signatures electronic elliptic curve embedded enciphered end-to-end Engineering example Figure filter FPGA frequency function gateway handset hardware implementation infrastructure input integrity interception Internet IPSec key size Layer Mbps mobile mode modulation multiple operation output packet parameters performance plaintext problem protect protocol pseudo-random public-key radio random number real-time receiver Rijndael router scramblers sequence server session signal SIGSALY specific speech Spread Spectrum standard stream cipher switch synchronization techniques telecommunications telephone throughput tion traffic transmission transmitted vocoder voice VoIP vulnerabilities wired wireless communications wireless devices Wireless LAN wireless security WLAN