Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Cryptography for mobile security

Cryptography for mobile security

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Security for Mobility — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Cryptography underlies the provision of security for just about every kind of communications network, and mobile networks are no exception. Just about every chapter in this volume makes use of cryptographic techniques and terminology, with which the reader is assumed to have a basic familiarity. The role of this preliminary chapter is to provide a very brief introduction to cryptography. Whilst reading this chapter is no substitute for a more detailed study of the subject, the main terms are introduced, with the goal of enabling much of the remainder of the book to be understood. There are many books on cryptography, and the interested reader is strongly encouraged to consult these books to gain a better grasp of the topic. Two books that can be recommended are Piper and Murphy's recent brief introduc tion to cryptography, which provides a basic introduction to the main concepts of cryptography, and Menezes, van Oorschot and Vanstone's encyclopaedic work on cryptography, which, despite now being some six years old, remains an enormously reliable source of information on all aspects of cryptography.

Inspec keywords: cryptography; mobile radio; telecommunication security

Other keywords: mobile security; mobile communication; cryptographic technique

Subjects: Cryptography

Preview this chapter:
Zoom in
Zoomout

Cryptography for mobile security, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte051e/PBTE051E_ch1-1.gif /docserver/preview/fulltext/books/te/pbte051e/PBTE051E_ch1-2.gif

Related content

content/books/10.1049/pbte051e_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address