East Baton Rouge Parish Library

Broadband planar antennas, design and applications, Zhi Ning Chen and Michael Y.W. Chia

Label
Broadband planar antennas, design and applications, Zhi Ning Chen and Michael Y.W. Chia
Language
eng
Bibliography note
Includes bibliographical references and index
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Broadband planar antennas
Nature of contents
dictionariesbibliography
Oclc number
169242569
Responsibility statement
Zhi Ning Chen and Michael Y.W. Chia
Sub title
design and applications
Summary
Annotation, The increasing demand for wireless communications has revolutionised the lifestyle of today's society and one of the key components of wireless technology is antenna design. Broadband planar antennas are the newest generation of antennas boasting the attractive features required, such as broad operating bandwidth, low profile, light weight, low cost and ease of integration into arrays or Radio Frequency (RF) circuits, to make them ideal components of modern communications systems. Research into small and broadband antennas has been spurred by the rapid development of portable wireless communication devices such as cell phones, laptops and personal digital assistants. This all-encompassing volume, Broadband Planar Antennas: Design and Applications, systematically describes the techniques for all planar antennas from microstrip patch antennas, suspended plate antennas and planar inverted-L/F antennas to planar dipole antennas. Also discussed are some of the most recent outcomes such as broadband antenna issues in promising ultra-wideband applications. -- Clearly describes the fundamentals of planar antennas and categorises them according to their radiation characteristics -- Introduces the advanced progress in broadband planar antennas for modern wireless communications -- Includes a wealth of case studies, design guidelines, figures and tables. This text is essential reading for antenna, RF and microwave engineers and manufacturers within the telecommunications industry. Its highly accessible approach will also appeal to researchers, postgraduate students and academic lecturers
Table Of Contents
Cover Table of Contents List of Figures List of Tables Preface Acknowledgments 1. INTRODUCTION 1.1 Trust and Computing 1.2 Instantiations 1.3 Design and Applications 1.4 Progression 2. MOTIVATING SCENARIOS 2.1 Properties 2.2 Basic Usage 2.3 Examples of Basic Usage 2.4 Position and Interests 2.5 Examples of Positioning 2.6 The Idealogical Debate 2.7 Further Reading 3. ATTACKS 3.1 Physical Attack 3.2 Software Attacks 3.3 Side-channel Analysis 3.4 Undocumented Functionality 3.5 Erasing Data 3.6 System Context 3.7 Defensive Strategy 3.8 Further Reading 4. FOUNDATIONS 4.1 Applications and Integration 4.2 Architectures 4.3 Booting 4.4 The Defense Community 4.5 Further Reading 5. DESIGN CHALLENGES 5.1 Context 5.2 Obstacles 5.3 Requirements 5.4 Technology Decisions 5.5 Further Reading 6. PLATFORM ARCHITECTURE 6.1 Overview 6.2 Erasing Secrets 6.3 The Source of Secrets 6.4 Software Threats 6.5 Code Integrity 6.6 Code Loading 6.7 Putting it All Together 6.8 What's Next 6.9 Further Reading 7. OUTBOUND AUTHENTICATION 7.1 Problem 7.2 Theory 7.3 Design and Implementation 7.4 Further Reading 8. VALIDATION 8.1 The Validation Process 8.2 Validation Strategy 8.3 Formalizing Security Properties 8.4 Formal Verification 8.5 Other Validation Tasks 8.6 Reflection 8.7 Further Reading 9. APPLICATION CASE STUDIES 9.1 Basic Building Blocks 9.2 Hardened Web Servers 9.3 Rights Management for Big Brother's Computer 9.4 Private Information 9.5 Other Projects 9.6 Lessons Learned 9.7 Further Reading 10. TCPA/TCG 10.1 Basic Structure 10.2 Outbound Authentication 10.3 Physical Attacks 10.4 Applications 10.5 Experimentation 10.6 TPM 1.2 Changes 10.7 Further Reading 11. EXPERIMENTING WITH TCPA/TCG 11.1 Desired Properties 11.2 The Lifetime Mismatch 11.3 Architecture 11.4 Implementation Experience 11.5 Application: Hardened Apache 11.6 Application: OpenCA 11.7 Application: Compartmented Attestation 11.8 Further Reading 12. NEW HORIZONS 12.1 Privilege Architectures 12.2 Hardware Research 12.3 Software Research 12.4 Current Industrial Platforms 12.5 Looming Industry Platforms 12.6 Secure Coprocessing Revisited 12.7 Further Reading Glossary References About the Author
Content
Mapped to

Incoming Resources