Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Gong, Lidong Chen. Guang.

Title Communication System Security / Lidong Chen. Guang Gong. [O'Reilly electronic resource]

Imprint [Place of publication not identified] : Chapman and Hall/CRC, 2012.
QR Code
Description 1 online resource
Note Title from content provider.
Contents Introduction; Nodes, Links, and Layers; Information Security Objectives and Protection Mechanisms; Trust Model; Threat Model; Communication System Security PRACTICAL CRYPTOGRAPHY PRIMITIVES ; Pseudorandom Sequence Generators ; Feedback Shift Register Sequences; Linear Spans and Berlekamp-Massey Algorithm; Randomness Criteria of a PRSG; Randomness Properties of m-Sequences; Nonlinear Generators; Blum-Blum-Shub (BBS) Generators; Security Modes of PRSGs; Known Attacks Design of Stream Ciphers ; Design Principles of Stream Ciphers; Stream Ciphers in Communication Systems; WG Stream Cipher; Grain and Grain-Like Generators; Trivium and Trivium-Like Generators; Snow 3G; AIDA/Cube Attacks Design of Block Ciphers, Hash Functions, and MAC ; Design Principles of Block Ciphers; DES (Data Encryption Standard,
NIST 1976); AES (Advanced Encryption Standard) Rijndael; Encryption Modes; Hash Functions; Message Authentication Code (MAC); Birthday Attack and Time-Memory Trade-Off Attacks Public-Key Cryptographic Algorithms ; Security of Public-Key Cryptography; Diffie-Hellman Key Exchange; RSA Encryption and Digital Signature; ElGamal Digital Signature Algorithm and Digital Signature Standard; Elliptic Curve Digital Signature Algorithm (EC-DSA); Identity-Based Cryptography from Bilinear Pairing SECURITY MECHANISMS AND PROTOCOLS ; Security Infrastructure ; Infrastructure Support; Authentication Server; Certificate Authority; Key Generation and Distribution Server; Signing Server Establish Protected Communications ; Mutual Authentication; Key Establishment; Cryptographic Algorithm Negotiation; Protected Communications Network Security
Protocols ; Internet Security Protocols (IPsec); Transport Layer Security (TLS); The Secure Shell (SSH); Hop-by-Hop versus End-to-End Protection; Intra-Domain versus Inter-Domain Protection; Network Domain Security in Cellular Systems WIRELESS SECURITY; Network Access Authentication ; Basic Concepts in Access Authentication; Authentication and Key Agreement (AKA) in 3G and LTE; Authentication, Authorization,
And Accounting (AAA); Extensible Authentication Protocol (EAP) Wireless Network Security ; Special Aspects of Wireless Protection; UMTS and LTE Air Link Protection; IEEE 802.11 Security Solutions Security for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE; Options for Fast Authentication; Secure Fast BSS Transition in IEEE 802.11; Security in Mobile IP -- Mobility Information Protection; Media Independent Handover -- Service Protection Broadcast and Multicast Key Distribution and Authentication ; Basic Models for Multicast Key Distribution; Logic Key Tree Based Multicast Key Distribution; Hash Chain Based Authentication; Merkle Trees for Authentication SYSTEM SECURITY; Trusted Platform ; The Platform; Introduction to Trusted Platform; Trust Principles and Basic Mechanisms; Technologies and Methodologies for
Trusted Platforms; Trusted Platform in Practice Physical-Layer Security ; Shannon's Perfect Secrecy; Wyner's Wiretap Channel; Wiretap Codes for Achievable Secrecy Using Parity Check Codes; Wiretap Codes for Achievable Secrecy Using Linear Codes; Other Methods for Physical-Layer Security Spread-Spectrum Techniques for Anti-Jamming Attacks ; Some Basic Concepts of Digital Communications; BPSK Direct-Sequence Spread-Spectrum Systems; Frequency-Hopping Spread Spectrum; The Jamming Attacks; Code-Division Multiple Access (CDMA) and Jamming Capacity; Bloom Filters and Or-Channel Schemes Appendix A: Computations in Finite Fields; Appendix B: Some Mathematical Formulae; Appendix C: Signals and Spectra in Physical Layer Index Notes, Exercises, and a Bibliography appear at the end of each chapter.
Subject Telecommunication -- Security measures.
Télécommunications -- Sécurité -- Mesures.
Telecommunication -- Security measures
ISBN 9781439840375 (electronic bk.)
1439840377 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information