LEADER 04972nmm a2200385 u 4500
001 EB001914406
003 EBX01000000000000001077308
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| und
020 |a 9781439840375 
050 4 |a TK5105.59 
100 1 |a Gong, Lidong Chen. Guang 
245 0 0 |a Communication System Security  |c Lidong Chen. Guang Gong 
260 |a [Place of publication not identified]  |b Chapman and Hall/CRC  |c 2012 
300 |a 1 online resource 
505 0 |a And Accounting (AAA); Extensible Authentication Protocol (EAP) Wireless Network Security ; Special Aspects of Wireless Protection; UMTS and LTE Air Link Protection; IEEE 802.11 Security Solutions Security for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE; Options for Fast Authentication; Secure Fast BSS Transition in IEEE 802.11; Security in Mobile IP -- Mobility Information Protection; Media Independent Handover -- Service Protection Broadcast and Multicast Key Distribution and Authentication ; Basic Models for Multicast Key Distribution; Logic Key Tree Based Multicast Key Distribution; Hash Chain Based Authentication; Merkle Trees for Authentication SYSTEM SECURITY; Trusted Platform ; The Platform; Introduction to Trusted Platform; Trust Principles and Basic Mechanisms; Technologies and Methodologies for 
505 0 |a NIST 1976); AES (Advanced Encryption Standard) Rijndael; Encryption Modes; Hash Functions; Message Authentication Code (MAC); Birthday Attack and Time-Memory Trade-Off Attacks Public-Key Cryptographic Algorithms ; Security of Public-Key Cryptography; Diffie-Hellman Key Exchange; RSA Encryption and Digital Signature; ElGamal Digital Signature Algorithm and Digital Signature Standard; Elliptic Curve Digital Signature Algorithm (EC-DSA); Identity-Based Cryptography from Bilinear Pairing SECURITY MECHANISMS AND PROTOCOLS ; Security Infrastructure ; Infrastructure Support; Authentication Server; Certificate Authority; Key Generation and Distribution Server; Signing Server Establish Protected Communications ; Mutual Authentication; Key Establishment; Cryptographic Algorithm Negotiation; Protected Communications Network Security 
505 0 |a Trusted Platforms; Trusted Platform in Practice Physical-Layer Security ; Shannon's Perfect Secrecy; Wyner's Wiretap Channel; Wiretap Codes for Achievable Secrecy Using Parity Check Codes; Wiretap Codes for Achievable Secrecy Using Linear Codes; Other Methods for Physical-Layer Security Spread-Spectrum Techniques for Anti-Jamming Attacks ; Some Basic Concepts of Digital Communications; BPSK Direct-Sequence Spread-Spectrum Systems; Frequency-Hopping Spread Spectrum; The Jamming Attacks; Code-Division Multiple Access (CDMA) and Jamming Capacity; Bloom Filters and Or-Channel Schemes Appendix A: Computations in Finite Fields; Appendix B: Some Mathematical Formulae; Appendix C: Signals and Spectra in Physical Layer Index Notes, Exercises, and a Bibliography appear at the end of each chapter 
505 0 |a Protocols ; Internet Security Protocols (IPsec); Transport Layer Security (TLS); The Secure Shell (SSH); Hop-by-Hop versus End-to-End Protection; Intra-Domain versus Inter-Domain Protection; Network Domain Security in Cellular Systems WIRELESS SECURITY; Network Access Authentication ; Basic Concepts in Access Authentication; Authentication and Key Agreement (AKA) in 3G and LTE; Authentication, Authorization 
505 0 |a Introduction; Nodes, Links, and Layers; Information Security Objectives and Protection Mechanisms; Trust Model; Threat Model; Communication System Security PRACTICAL CRYPTOGRAPHY PRIMITIVES ; Pseudorandom Sequence Generators ; Feedback Shift Register Sequences; Linear Spans and Berlekamp-Massey Algorithm; Randomness Criteria of a PRSG; Randomness Properties of m-Sequences; Nonlinear Generators; Blum-Blum-Shub (BBS) Generators; Security Modes of PRSGs; Known Attacks Design of Stream Ciphers ; Design Principles of Stream Ciphers; Stream Ciphers in Communication Systems; WG Stream Cipher; Grain and Grain-Like Generators; Trivium and Trivium-Like Generators; Snow 3G; AIDA/Cube Attacks Design of Block Ciphers, Hash Functions, and MAC ; Design Principles of Block Ciphers; DES (Data Encryption Standard 
653 |a TECHNOLOGY & ENGINEERING / Telecommunications / bisacsh 
653 |a Télécommunications / Sécurité / Mesures 
653 |a Telecommunication / Security measures / http://id.loc.gov/authorities/subjects/sh85133285 
653 |a Telecommunication / Security measures / fast 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a und  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Title from content provider 
776 |z 9781439840375 
776 |z 1439840377 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439840375/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 620 
082 0 |a 005.8