Cargando…

Communication System Security.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Chen, Lidong, Gong, Guang
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Abingdon : CRC Press [Imprint] Taylor & Francis Group. May 2012
Colección:Chapman and Hall/CRC Cryptography and Network Security Ser.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000M 4500
001 EBOOKCENTRAL_ocn902693366
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 140210e20120531xxka ob 001 0 eng d
040 |a VT2  |b eng  |e pn  |c VT2  |d EBLCP  |d YDXCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d MERUC  |d AU@  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OTZ  |d UWO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 908078145 
020 |a 9781439840375 
020 |a 1439840377  |q (E-Book) 
029 1 |a DEBSZ  |b 456549102 
035 |a (OCoLC)902693366  |z (OCoLC)908078145 
037 |a 1439840377  |b 00032882 
050 4 |a TK5102.85 .C44 2015 
072 7 |a COM  |x 046000  |2 bisacsh 
072 7 |a COM  |x 083000  |2 bisacsh 
072 7 |a TEC  |x 061000  |2 bisacsh 
072 7 |a TJK  |2 bicscc 
082 0 4 |a 621.389/28  |2 23 
049 |a UAMI 
245 0 0 |a Communication System Security. 
260 |b CRC Press [Imprint]  |c May 2012  |a Abingdon :  |b Taylor & Francis Group. 
300 |a 1 online resource (750 pages)  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Chapman and Hall/CRC Cryptography and Network Security Ser. 
520 8 |a Annotation  |b Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions. Taking an evolutionary approach to security in today's telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios. Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks. With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis. 
505 0 |a Front Cover; Contents; Preface; Acknowledgments; 1. Introduction; I. Practical Cryptography Primitives; 2. Pseudorandom Sequence Generators; 3. Design of Stream Ciphers; 4. Design of Block Ciphers, Hash Functions, and MAC; 5. Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. Security Infrastructure; 7. Establish Protected Communications; 8. Network Security Protocols; III. Wireless Security; 9. Network Access Authentication; 10. Wireless Network Security; 11. Security for Mobility; 12. Broadcast and Multicast Key Distribution and Authentication. 
505 8 |a IV. System Security13. Trusted Platform; 14. Physical-Layer Security; 15. Spread-Spectrum Techniques for Anti-Jamming-Attacks; APPENDICES; A. Computations in Finite Fields; B. Some Mathematical Formulae; C. Signals and Spectra in Physical Layer. 
504 |a Includes bibliographical references and index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Telecommunication  |x Security measures. 
650 6 |a Télécommunications  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Mobile & Wireless Communications.  |2 bisacsh 
650 7 |a Telecommunication  |x Security measures  |2 fast 
700 1 |a Chen, Lidong. 
700 1 |a Gong, Guang. 
758 |i has work:  |a Communication system security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGFQDqMV3FH7Q6MjWY86cd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Chen, Lidong.  |t Communication System Security.  |d Hoboken : CRC Press, ©2012  |z 9781439840368 
830 0 |a Chapman and Hall/CRC Cryptography and Network Security Ser. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1575384  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1575384 
938 |a YBP Library Services  |b YANK  |n 7466815 
994 |a 92  |b IZTAP