000 01485nam a2200181Ia 4500
008 140223b2007 xxu||||| |||| 00| 0 eng d
020 _a9780849387715
_c0.00
082 _a005.8
_bWIR
100 _aSklavos, Nicolas
245 _aWireless Security and Cryptography: Specifications and Implementations
260 _aBoca Raton
_bCRC Press
_c2007
300 _a400p
500 _aOverview of Cryptographic Primitives for Secure Communication Introduction to Communication Security Efficient VLSI Architectures for the Advanced Encryption Standard Algorithm Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems Efficient Elliptic Curve Cryptographic Hardware Design for Wireless Security Cryptographic Algorithms in Constrained Environments Side Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms Security Enhancement Layer for Bluetooth WLAN Security Processing Architectures Security Architecture and Implementation of the Universal Mobile Telecommunication System Wireless Application Protocol Security Processor: Privacy, Authentication, and Data Integrity Binary Algorithms for Multiplicative Inversion Smart Card Technology
600 _aComputer Engineering
700 _aZhang, Xinmiao
890 _aUK
995 _AWIR
_B007016
_CCET-NIT
_D3055.59
_E0
_F049
_GIN721
_H0
_I0.00
_J4129.17 26%
_L20080317
_M01
_UC
_W20080325
_XKushal Books
_ZReference
999 _c49375
_d49375