|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-540-71192-6 |
003 |
DE-He213 |
005 |
20220116174313.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540711926
|9 978-3-540-71192-6
|
024 |
7 |
|
|a 10.1007/3-540-71192-9
|2 doi
|
050 |
|
4 |
|a TK5101-5105.9
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Stavroulakis, Peter.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a TErrestrial Trunked RAdio - TETRA
|h [electronic resource] :
|b A Global Security Tool /
|c by Peter Stavroulakis.
|
250 |
|
|
|a 1st ed. 2007.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2007.
|
300 |
|
|
|a XVI, 302 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Signals and Communication Technology,
|x 1860-4870
|
505 |
0 |
|
|a Modern Security Requirements in Private Mobile Communications Systems -- Tetra Providing an Acceptable Security System Solution -- Channel Assignment and Multiple Access in Trunking Radio Systems [1] -- Video Transmission over Tetra -- TETRA as a Gateway to Other Wireless Systems -- Tetra as a Building block to WMNs.
|
520 |
|
|
|a Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security. The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Microwaves, RF Engineering and Optical Communications.
|
650 |
2 |
4 |
|a Cryptology.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540835981
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642090295
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540711902
|
830 |
|
0 |
|a Signals and Communication Technology,
|x 1860-4870
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/3-540-71192-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|