Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc ...
Praphul Chandra
Inside this book you'll find coverage of these essential topics: + Cryptographic protocols used in wireless networks. + Key-based protocols, including key exchange and authentication techniques + Various types of wireless network attacks, ...