Optimizing Wireless Security with FPGAs and ASICs


Please sign in to view the rest of this entry.

Optimizing Wireless Security with FPGAs and ASICs
10114041010507Optimizing Wireless Security with FPGAs and ASICsHaving defined the functionality and explained the need—as well as the merits—of end-to-end security in communications and more specifically relative to the wireless arena, this chapter elaborates on solutions in hardware versus software and discusses the two fundamental hardware categories, namely, configurable and non-configurable circuitry. Avenues of rapid implementations for highly integrated security solutions are investigated and various technologies are considered as enabling platforms, such as …
Citation
Randall K. Nichols; Panos C. Lekkas: Wireless Security: Models, Threats, and Solutions. Optimizing Wireless Security with FPGAs and ASICs, Chapter (McGraw-Hill Professional, 2002), AccessEngineering Export