Cargando…

Communication System Security /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gong, Lidong Chen. Guang
Formato: Electrónico eBook
Idioma:Indeterminado
Publicado: [Place of publication not identified] : Chapman and Hall/CRC, 2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_ocn900313304
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 150108s2012 xx o 000 0 und d
040 |a COO  |b eng  |e pn  |c COO  |d OCLCQ  |d EBLCP  |d N$T  |d OCLCF  |d OCLCQ  |d UKAHL  |d NLW  |d OCLCQ  |d ELBRO  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781439840375  |q (electronic bk.) 
020 |a 1439840377  |q (electronic bk.) 
029 1 |a AU@  |b 000057232922 
035 |a (OCoLC)900313304 
050 4 |a TK5105.59 
072 7 |a TEC  |x 041000  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Gong, Lidong Chen. Guang. 
245 1 0 |a Communication System Security /  |c Lidong Chen. Guang Gong. 
260 |a [Place of publication not identified] :  |b Chapman and Hall/CRC,  |c 2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from content provider. 
505 0 |a Introduction; Nodes, Links, and Layers; Information Security Objectives and Protection Mechanisms; Trust Model; Threat Model; Communication System Security PRACTICAL CRYPTOGRAPHY PRIMITIVES ; Pseudorandom Sequence Generators ; Feedback Shift Register Sequences; Linear Spans and Berlekamp-Massey Algorithm; Randomness Criteria of a PRSG; Randomness Properties of m-Sequences; Nonlinear Generators; Blum-Blum-Shub (BBS) Generators; Security Modes of PRSGs; Known Attacks Design of Stream Ciphers ; Design Principles of Stream Ciphers; Stream Ciphers in Communication Systems; WG Stream Cipher; Grain and Grain-Like Generators; Trivium and Trivium-Like Generators; Snow 3G; AIDA/Cube Attacks Design of Block Ciphers, Hash Functions, and MAC ; Design Principles of Block Ciphers; DES (Data Encryption Standard, 
505 0 |a NIST 1976); AES (Advanced Encryption Standard) Rijndael; Encryption Modes; Hash Functions; Message Authentication Code (MAC); Birthday Attack and Time-Memory Trade-Off Attacks Public-Key Cryptographic Algorithms ; Security of Public-Key Cryptography; Diffie-Hellman Key Exchange; RSA Encryption and Digital Signature; ElGamal Digital Signature Algorithm and Digital Signature Standard; Elliptic Curve Digital Signature Algorithm (EC-DSA); Identity-Based Cryptography from Bilinear Pairing SECURITY MECHANISMS AND PROTOCOLS ; Security Infrastructure ; Infrastructure Support; Authentication Server; Certificate Authority; Key Generation and Distribution Server; Signing Server Establish Protected Communications ; Mutual Authentication; Key Establishment; Cryptographic Algorithm Negotiation; Protected Communications Network Security 
505 0 |a Protocols ; Internet Security Protocols (IPsec); Transport Layer Security (TLS); The Secure Shell (SSH); Hop-by-Hop versus End-to-End Protection; Intra-Domain versus Inter-Domain Protection; Network Domain Security in Cellular Systems WIRELESS SECURITY; Network Access Authentication ; Basic Concepts in Access Authentication; Authentication and Key Agreement (AKA) in 3G and LTE; Authentication, Authorization, 
505 0 |a And Accounting (AAA); Extensible Authentication Protocol (EAP) Wireless Network Security ; Special Aspects of Wireless Protection; UMTS and LTE Air Link Protection; IEEE 802.11 Security Solutions Security for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE; Options for Fast Authentication; Secure Fast BSS Transition in IEEE 802.11; Security in Mobile IP -- Mobility Information Protection; Media Independent Handover -- Service Protection Broadcast and Multicast Key Distribution and Authentication ; Basic Models for Multicast Key Distribution; Logic Key Tree Based Multicast Key Distribution; Hash Chain Based Authentication; Merkle Trees for Authentication SYSTEM SECURITY; Trusted Platform ; The Platform; Introduction to Trusted Platform; Trust Principles and Basic Mechanisms; Technologies and Methodologies for 
505 0 |a Trusted Platforms; Trusted Platform in Practice Physical-Layer Security ; Shannon's Perfect Secrecy; Wyner's Wiretap Channel; Wiretap Codes for Achievable Secrecy Using Parity Check Codes; Wiretap Codes for Achievable Secrecy Using Linear Codes; Other Methods for Physical-Layer Security Spread-Spectrum Techniques for Anti-Jamming Attacks ; Some Basic Concepts of Digital Communications; BPSK Direct-Sequence Spread-Spectrum Systems; Frequency-Hopping Spread Spectrum; The Jamming Attacks; Code-Division Multiple Access (CDMA) and Jamming Capacity; Bloom Filters and Or-Channel Schemes Appendix A: Computations in Finite Fields; Appendix B: Some Mathematical Formulae; Appendix C: Signals and Spectra in Physical Layer Index Notes, Exercises, and a Bibliography appear at the end of each chapter. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Telecommunication  |x Security measures. 
650 6 |a Télécommunications  |x Sécurité  |x Mesures. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Telecommunications.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Telecommunication  |x Security measures  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439840375/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a eLibro  |b ELBO  |n ELB142909 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24133008 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4743032 
938 |a EBSCOhost  |b EBSC  |n 1499655 
994 |a 92  |b IZTAP