|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_ocn900313304 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
150108s2012 xx o 000 0 und d |
040 |
|
|
|a COO
|b eng
|e pn
|c COO
|d OCLCQ
|d EBLCP
|d N$T
|d OCLCF
|d OCLCQ
|d UKAHL
|d NLW
|d OCLCQ
|d ELBRO
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781439840375
|q (electronic bk.)
|
020 |
|
|
|a 1439840377
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000057232922
|
035 |
|
|
|a (OCoLC)900313304
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a TEC
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gong, Lidong Chen. Guang.
|
245 |
1 |
0 |
|a Communication System Security /
|c Lidong Chen. Guang Gong.
|
260 |
|
|
|a [Place of publication not identified] :
|b Chapman and Hall/CRC,
|c 2012.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from content provider.
|
505 |
0 |
|
|a Introduction; Nodes, Links, and Layers; Information Security Objectives and Protection Mechanisms; Trust Model; Threat Model; Communication System Security PRACTICAL CRYPTOGRAPHY PRIMITIVES ; Pseudorandom Sequence Generators ; Feedback Shift Register Sequences; Linear Spans and Berlekamp-Massey Algorithm; Randomness Criteria of a PRSG; Randomness Properties of m-Sequences; Nonlinear Generators; Blum-Blum-Shub (BBS) Generators; Security Modes of PRSGs; Known Attacks Design of Stream Ciphers ; Design Principles of Stream Ciphers; Stream Ciphers in Communication Systems; WG Stream Cipher; Grain and Grain-Like Generators; Trivium and Trivium-Like Generators; Snow 3G; AIDA/Cube Attacks Design of Block Ciphers, Hash Functions, and MAC ; Design Principles of Block Ciphers; DES (Data Encryption Standard,
|
505 |
0 |
|
|a NIST 1976); AES (Advanced Encryption Standard) Rijndael; Encryption Modes; Hash Functions; Message Authentication Code (MAC); Birthday Attack and Time-Memory Trade-Off Attacks Public-Key Cryptographic Algorithms ; Security of Public-Key Cryptography; Diffie-Hellman Key Exchange; RSA Encryption and Digital Signature; ElGamal Digital Signature Algorithm and Digital Signature Standard; Elliptic Curve Digital Signature Algorithm (EC-DSA); Identity-Based Cryptography from Bilinear Pairing SECURITY MECHANISMS AND PROTOCOLS ; Security Infrastructure ; Infrastructure Support; Authentication Server; Certificate Authority; Key Generation and Distribution Server; Signing Server Establish Protected Communications ; Mutual Authentication; Key Establishment; Cryptographic Algorithm Negotiation; Protected Communications Network Security
|
505 |
0 |
|
|a Protocols ; Internet Security Protocols (IPsec); Transport Layer Security (TLS); The Secure Shell (SSH); Hop-by-Hop versus End-to-End Protection; Intra-Domain versus Inter-Domain Protection; Network Domain Security in Cellular Systems WIRELESS SECURITY; Network Access Authentication ; Basic Concepts in Access Authentication; Authentication and Key Agreement (AKA) in 3G and LTE; Authentication, Authorization,
|
505 |
0 |
|
|a And Accounting (AAA); Extensible Authentication Protocol (EAP) Wireless Network Security ; Special Aspects of Wireless Protection; UMTS and LTE Air Link Protection; IEEE 802.11 Security Solutions Security for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE; Options for Fast Authentication; Secure Fast BSS Transition in IEEE 802.11; Security in Mobile IP -- Mobility Information Protection; Media Independent Handover -- Service Protection Broadcast and Multicast Key Distribution and Authentication ; Basic Models for Multicast Key Distribution; Logic Key Tree Based Multicast Key Distribution; Hash Chain Based Authentication; Merkle Trees for Authentication SYSTEM SECURITY; Trusted Platform ; The Platform; Introduction to Trusted Platform; Trust Principles and Basic Mechanisms; Technologies and Methodologies for
|
505 |
0 |
|
|a Trusted Platforms; Trusted Platform in Practice Physical-Layer Security ; Shannon's Perfect Secrecy; Wyner's Wiretap Channel; Wiretap Codes for Achievable Secrecy Using Parity Check Codes; Wiretap Codes for Achievable Secrecy Using Linear Codes; Other Methods for Physical-Layer Security Spread-Spectrum Techniques for Anti-Jamming Attacks ; Some Basic Concepts of Digital Communications; BPSK Direct-Sequence Spread-Spectrum Systems; Frequency-Hopping Spread Spectrum; The Jamming Attacks; Code-Division Multiple Access (CDMA) and Jamming Capacity; Bloom Filters and Or-Channel Schemes Appendix A: Computations in Finite Fields; Appendix B: Some Mathematical Formulae; Appendix C: Signals and Spectra in Physical Layer Index Notes, Exercises, and a Bibliography appear at the end of each chapter.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Telecommunication
|x Security measures.
|
650 |
|
6 |
|a Télécommunications
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Telecommunications.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Telecommunication
|x Security measures
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439840375/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a eLibro
|b ELBO
|n ELB142909
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24133008
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4743032
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1499655
|
994 |
|
|
|a 92
|b IZTAP
|