|
|
|
|
LEADER |
00000cam a2200000M 4500 |
001 |
OR_ocn729024293 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr un|---uuuuu |
008 |
101115s2010 xx ob 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d OCLCQ
|d STF
|d COO
|d OCLCQ
|d UMI
|d DEBSZ
|d OCLCQ
|d OCLCF
|d UKBOL
|d OCLCQ
|d EBLCP
|d OCLCQ
|d CEF
|d UAB
|d OCLCQ
|d OCLCO
|d UKAHL
|
019 |
|
|
|a 809734133
|a 816589132
|a 841331984
|
020 |
|
|
|a 9780470973288
|q (ePDF)
|
020 |
|
|
|a 0470973285
|q (ePDF)
|
020 |
|
|
|a 9780470973271
|q (oBook)
|
020 |
|
|
|a 0470973277
|q (oBook)
|
020 |
|
|
|a 1282783572
|
020 |
|
|
|a 9781282783577
|
020 |
|
|
|a 9781119991915
|
020 |
|
|
|a 1119991919
|
020 |
|
|
|z 9780470661031
|q (hardback)
|
020 |
|
|
|z 0470661038
|
029 |
1 |
|
|a AU@
|b 000051432898
|
029 |
1 |
|
|a AU@
|b 000053271287
|
029 |
1 |
|
|a DEBBG
|b BV041121726
|
029 |
1 |
|
|a DEBSZ
|b 396766501
|
035 |
|
|
|a (OCoLC)729024293
|z (OCoLC)809734133
|z (OCoLC)816589132
|z (OCoLC)841331984
|
037 |
|
|
|a CL0500000213
|b Safari Books Online
|
050 |
|
4 |
|a TK5103.48325
|
072 |
|
7 |
|a TJ
|2 bicssc
|
082 |
0 |
4 |
|a 621.3845/6
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a LTE Security.
|
260 |
|
|
|b John Wiley & Sons
|c 2010.
|
300 |
|
|
|a 1 online resource (304)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover13; -- Contents -- Foreword -- Acknowledgements -- 1 Overview of the Book -- 2 Background -- 2.1 Evolution of Cellular Systems -- 2.1.1 Third-generation Network Architecture -- 2.1.2 Important Elements of the 3G Architecture -- 2.1.3 Functions and Protocols in the 3GPP System -- 2.1.4 The EPS System -- 2.2 Basic Security Concepts -- 2.2.1 Information Security -- 2.2.2 Design Principles -- 2.2.3 Communication Security Features -- 2.3 Basic Cryptographic Concepts -- 2.3.1 Cryptographic Functions -- 2.3.2 Securing Systems with Cryptographic Methods -- 2.3.3 Symmetric Encryption Methods -- 2.3.4 Hash Functions -- 2.3.5 Public-key Cryptography and PKI -- 2.3.6 Cryptanalysis -- 2.4 Introduction to LTE Standardization -- 2.4.1 Working Procedures in 3GPP -- 2.5 Notes on Terminology and Specification Language -- 2.5.1 Terminology -- 2.5.2 Specification Language -- 3 GSM Security -- 3.1 Principles of GSM Security -- 3.2 The Role of the SIM -- 3.3 Mechanisms of GSM Security -- 3.3.1 Subscriber Authentication in GSM -- 3.3.2 GSM Encryption -- 3.3.3 GPRS Encryption -- 3.3.4 Subscriber Identity Confidentiality -- 3.4 GSM Cryptographic Algorithms -- 4 Third-generation Security (UMTS) -- 4.1 Principles of Third-generation Security -- 4.1.1 Elements of GSM Security Carried Over to 3G -- 4.1.2 Weaknesses in GSM Security -- 4.1.3 Higher Level Objectives -- 4.2 Third-generation Security Mechanisms -- 4.2.1 Authentication and Key Agreement -- 4.2.2 Ciphering Mechanism -- 4.2.3 Integrity Protection Mechanism -- 4.2.4 Identity Confidentiality Mechanism -- 4.3 Third-generation Cryptographic Algorithms -- 4.3.1 KASUMI -- 4.3.2 UEA1 and UIA1 -- 4.3.3 SNOW3G, UEA2 and UIA2 -- 4.3.4 MILENAGE -- 4.3.5 Hash Functions -- 4.4 Interworking between GSM and 3G security -- 4.4.1 Interworking Scenarios -- 4.4.2 Cases with SIM -- 4.4.3 Cases with USIM -- 4.4.4 Handovers between GSM and 3G -- 4.5 Network Domain Security -- 4.5.1 Generic Security Domain Framework -- 4.5.2 Security Mechanisms for NDS -- 4.5.3 Application of NDS -- 5 3G8211;WLAN Interworking -- 5.1 Principles of 3G8211;WLAN Interworking -- 5.1.1 The General Idea -- 5.1.2 The EAP Framework -- 5.1.3 Overview of EAP-AKA -- 5.2 Security Mechanisms of 3G8211;WLAN Interworking -- 5.2.1 Reference Model for 3G8211;WLAN Interworking -- 5.2.2 Security Mechanisms of WLAN Direct IP Access -- 5.2.3 Security Mechanisms of WLAN 3GPP IP Access -- 5.3 Cryptographic Algorithms for 3G8211;WLAN Interworking -- 6 EPS Security Architecture -- 6.1 Overview and Relevant Specifications -- 6.1.1 Need for Security Standardization -- 6.1.2 Relevant Non-security Specifications -- 6.1.3 Security Specifications for EPS -- 6.2 Requirements and Features of EPS Security -- 6.2.1 Threats against EPS -- 6.2.2 EPS Security Features -- 6.2.3 How the Features Meet the Requirements -- 6.3 Design Decisions for EPS Security -- 6.4 Platform Security for Base Stations -- 6.4.1 General Security Considerations -- 6.4.2 Specification of Platform Security -- 6.4.3 Exposed Position and Threats -- 6.4.4 Security Requirements -- 7 EPS Authentication and Key Agreement -- 7.1 Identification -- 7.1.1 User Identity Confidentiality -- 7.1.2 Terminal Identity Confidentiality -- 7.2 The EPS Authentication and Key Agreement.
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Long-Term Evolution (Telecommunications)
|
650 |
|
0 |
|a Global system for mobile communications.
|
650 |
|
6 |
|a Technologie d'évolution à long terme (Norme)
|
650 |
|
6 |
|a GSM (Radiotéléphonie)
|
650 |
|
7 |
|a Global system for mobile communications.
|2 fast
|0 (OCoLC)fst00943493
|
650 |
|
7 |
|a Long-Term Evolution (Telecommunications)
|2 fast
|0 (OCoLC)fst01762769
|
655 |
|
4 |
|a Electronic resource.
|
700 |
1 |
|
|a Horn, G?nther.
|4 aut
|
700 |
1 |
|
|a Moeller, Wolf-Dietrich.
|4 aut
|
700 |
1 |
|
|a Niemi, Valtteri.
|4 aut
|
720 |
|
|
|a Forsberg, Dan.
|
776 |
0 |
8 |
|i Print version:
|t LTE security.
|d Chichester, West Sussex, U.K. : Wiley, 2010
|z 9780470661031
|w (DLC) 2010022116
|w (OCoLC)645673755
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119991915/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH16076307
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4043518
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 278357
|
994 |
|
|
|a 92
|b IZTAP
|