Cargando…

LTE Security.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Horn, G?nther (Autor), Moeller, Wolf-Dietrich (Autor), Niemi, Valtteri (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: John Wiley & Sons 2010.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000M 4500
001 OR_ocn729024293
003 OCoLC
005 20231017213018.0
006 m o d
007 cr un|---uuuuu
008 101115s2010 xx ob 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d OCLCQ  |d STF  |d COO  |d OCLCQ  |d UMI  |d DEBSZ  |d OCLCQ  |d OCLCF  |d UKBOL  |d OCLCQ  |d EBLCP  |d OCLCQ  |d CEF  |d UAB  |d OCLCQ  |d OCLCO  |d UKAHL 
019 |a 809734133  |a 816589132  |a 841331984 
020 |a 9780470973288  |q (ePDF) 
020 |a 0470973285  |q (ePDF) 
020 |a 9780470973271  |q (oBook) 
020 |a 0470973277  |q (oBook) 
020 |a 1282783572 
020 |a 9781282783577 
020 |a 9781119991915 
020 |a 1119991919 
020 |z 9780470661031  |q (hardback) 
020 |z 0470661038 
029 1 |a AU@  |b 000051432898 
029 1 |a AU@  |b 000053271287 
029 1 |a DEBBG  |b BV041121726 
029 1 |a DEBSZ  |b 396766501 
035 |a (OCoLC)729024293  |z (OCoLC)809734133  |z (OCoLC)816589132  |z (OCoLC)841331984 
037 |a CL0500000213  |b Safari Books Online 
050 4 |a TK5103.48325 
072 7 |a TJ  |2 bicssc 
082 0 4 |a 621.3845/6  |2 22 
049 |a UAMI 
245 0 0 |a LTE Security. 
260 |b John Wiley & Sons  |c 2010. 
300 |a 1 online resource (304) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover13; -- Contents -- Foreword -- Acknowledgements -- 1 Overview of the Book -- 2 Background -- 2.1 Evolution of Cellular Systems -- 2.1.1 Third-generation Network Architecture -- 2.1.2 Important Elements of the 3G Architecture -- 2.1.3 Functions and Protocols in the 3GPP System -- 2.1.4 The EPS System -- 2.2 Basic Security Concepts -- 2.2.1 Information Security -- 2.2.2 Design Principles -- 2.2.3 Communication Security Features -- 2.3 Basic Cryptographic Concepts -- 2.3.1 Cryptographic Functions -- 2.3.2 Securing Systems with Cryptographic Methods -- 2.3.3 Symmetric Encryption Methods -- 2.3.4 Hash Functions -- 2.3.5 Public-key Cryptography and PKI -- 2.3.6 Cryptanalysis -- 2.4 Introduction to LTE Standardization -- 2.4.1 Working Procedures in 3GPP -- 2.5 Notes on Terminology and Specification Language -- 2.5.1 Terminology -- 2.5.2 Specification Language -- 3 GSM Security -- 3.1 Principles of GSM Security -- 3.2 The Role of the SIM -- 3.3 Mechanisms of GSM Security -- 3.3.1 Subscriber Authentication in GSM -- 3.3.2 GSM Encryption -- 3.3.3 GPRS Encryption -- 3.3.4 Subscriber Identity Confidentiality -- 3.4 GSM Cryptographic Algorithms -- 4 Third-generation Security (UMTS) -- 4.1 Principles of Third-generation Security -- 4.1.1 Elements of GSM Security Carried Over to 3G -- 4.1.2 Weaknesses in GSM Security -- 4.1.3 Higher Level Objectives -- 4.2 Third-generation Security Mechanisms -- 4.2.1 Authentication and Key Agreement -- 4.2.2 Ciphering Mechanism -- 4.2.3 Integrity Protection Mechanism -- 4.2.4 Identity Confidentiality Mechanism -- 4.3 Third-generation Cryptographic Algorithms -- 4.3.1 KASUMI -- 4.3.2 UEA1 and UIA1 -- 4.3.3 SNOW3G, UEA2 and UIA2 -- 4.3.4 MILENAGE -- 4.3.5 Hash Functions -- 4.4 Interworking between GSM and 3G security -- 4.4.1 Interworking Scenarios -- 4.4.2 Cases with SIM -- 4.4.3 Cases with USIM -- 4.4.4 Handovers between GSM and 3G -- 4.5 Network Domain Security -- 4.5.1 Generic Security Domain Framework -- 4.5.2 Security Mechanisms for NDS -- 4.5.3 Application of NDS -- 5 3G8211;WLAN Interworking -- 5.1 Principles of 3G8211;WLAN Interworking -- 5.1.1 The General Idea -- 5.1.2 The EAP Framework -- 5.1.3 Overview of EAP-AKA -- 5.2 Security Mechanisms of 3G8211;WLAN Interworking -- 5.2.1 Reference Model for 3G8211;WLAN Interworking -- 5.2.2 Security Mechanisms of WLAN Direct IP Access -- 5.2.3 Security Mechanisms of WLAN 3GPP IP Access -- 5.3 Cryptographic Algorithms for 3G8211;WLAN Interworking -- 6 EPS Security Architecture -- 6.1 Overview and Relevant Specifications -- 6.1.1 Need for Security Standardization -- 6.1.2 Relevant Non-security Specifications -- 6.1.3 Security Specifications for EPS -- 6.2 Requirements and Features of EPS Security -- 6.2.1 Threats against EPS -- 6.2.2 EPS Security Features -- 6.2.3 How the Features Meet the Requirements -- 6.3 Design Decisions for EPS Security -- 6.4 Platform Security for Base Stations -- 6.4.1 General Security Considerations -- 6.4.2 Specification of Platform Security -- 6.4.3 Exposed Position and Threats -- 6.4.4 Security Requirements -- 7 EPS Authentication and Key Agreement -- 7.1 Identification -- 7.1.1 User Identity Confidentiality -- 7.1.2 Terminal Identity Confidentiality -- 7.2 The EPS Authentication and Key Agreement. 
504 |a Includes bibliographical references. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Long-Term Evolution (Telecommunications) 
650 0 |a Global system for mobile communications. 
650 6 |a Technologie d'évolution à long terme (Norme) 
650 6 |a GSM (Radiotéléphonie) 
650 7 |a Global system for mobile communications.  |2 fast  |0 (OCoLC)fst00943493 
650 7 |a Long-Term Evolution (Telecommunications)  |2 fast  |0 (OCoLC)fst01762769 
655 4 |a Electronic resource. 
700 1 |a Horn, G?nther.  |4 aut 
700 1 |a Moeller, Wolf-Dietrich.  |4 aut 
700 1 |a Niemi, Valtteri.  |4 aut 
720 |a Forsberg, Dan. 
776 0 8 |i Print version:  |t LTE security.  |d Chichester, West Sussex, U.K. : Wiley, 2010  |z 9780470661031  |w (DLC) 2010022116  |w (OCoLC)645673755 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119991915/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH16076307 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4043518 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 278357 
994 |a 92  |b IZTAP