Limit search to available items
Book Cover
E-book
Author Gong, Lidong Chen. Guang

Title Communication System Security / Lidong Chen. Guang Gong
Published [Place of publication not identified] : Chapman and Hall/CRC, 2012

Copies

Description 1 online resource
Contents Introduction; Nodes, Links, and Layers; Information Security Objectives and Protection Mechanisms; Trust Model; Threat Model; Communication System Security PRACTICAL CRYPTOGRAPHY PRIMITIVES ; Pseudorandom Sequence Generators ; Feedback Shift Register Sequences; Linear Spans and Berlekamp-Massey Algorithm; Randomness Criteria of a PRSG; Randomness Properties of m-Sequences; Nonlinear Generators; Blum-Blum-Shub (BBS) Generators; Security Modes of PRSGs; Known Attacks Design of Stream Ciphers ; Design Principles of Stream Ciphers; Stream Ciphers in Communication Systems; WG Stream Cipher; Grain and Grain-Like Generators; Trivium and Trivium-Like Generators; Snow 3G; AIDA/Cube Attacks Design of Block Ciphers, Hash Functions, and MAC ; Design Principles of Block Ciphers; DES (Data Encryption Standard,
NIST 1976); AES (Advanced Encryption Standard) Rijndael; Encryption Modes; Hash Functions; Message Authentication Code (MAC); Birthday Attack and Time-Memory Trade-Off Attacks Public-Key Cryptographic Algorithms ; Security of Public-Key Cryptography; Diffie-Hellman Key Exchange; RSA Encryption and Digital Signature; ElGamal Digital Signature Algorithm and Digital Signature Standard; Elliptic Curve Digital Signature Algorithm (EC-DSA); Identity-Based Cryptography from Bilinear Pairing SECURITY MECHANISMS AND PROTOCOLS ; Security Infrastructure ; Infrastructure Support; Authentication Server; Certificate Authority; Key Generation and Distribution Server; Signing Server Establish Protected Communications ; Mutual Authentication; Key Establishment; Cryptographic Algorithm Negotiation; Protected Communications Network Security
Protocols ; Internet Security Protocols (IPsec); Transport Layer Security (TLS); The Secure Shell (SSH); Hop-by-Hop versus End-to-End Protection; Intra-Domain versus Inter-Domain Protection; Network Domain Security in Cellular Systems WIRELESS SECURITY; Network Access Authentication ; Basic Concepts in Access Authentication; Authentication and Key Agreement (AKA) in 3G and LTE; Authentication, Authorization,
And Accounting (AAA); Extensible Authentication Protocol (EAP) Wireless Network Security ; Special Aspects of Wireless Protection; UMTS and LTE Air Link Protection; IEEE 802.11 Security Solutions Security for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE; Options for Fast Authentication; Secure Fast BSS Transition in IEEE 802.11; Security in Mobile IP -- Mobility Information Protection; Media Independent Handover -- Service Protection Broadcast and Multicast Key Distribution and Authentication ; Basic Models for Multicast Key Distribution; Logic Key Tree Based Multicast Key Distribution; Hash Chain Based Authentication; Merkle Trees for Authentication SYSTEM SECURITY; Trusted Platform ; The Platform; Introduction to Trusted Platform; Trust Principles and Basic Mechanisms; Technologies and Methodologies for
Trusted Platforms; Trusted Platform in Practice Physical-Layer Security ; Shannon's Perfect Secrecy; Wyner's Wiretap Channel; Wiretap Codes for Achievable Secrecy Using Parity Check Codes; Wiretap Codes for Achievable Secrecy Using Linear Codes; Other Methods for Physical-Layer Security Spread-Spectrum Techniques for Anti-Jamming Attacks ; Some Basic Concepts of Digital Communications; BPSK Direct-Sequence Spread-Spectrum Systems; Frequency-Hopping Spread Spectrum; The Jamming Attacks; Code-Division Multiple Access (CDMA) and Jamming Capacity; Bloom Filters and Or-Channel Schemes Appendix A: Computations in Finite Fields; Appendix B: Some Mathematical Formulae; Appendix C: Signals and Spectra in Physical Layer Index Notes, Exercises, and a Bibliography appear at the end of each chapter
Notes Title from content provider
Subject Telecommunication -- Security measures.
TECHNOLOGY & ENGINEERING -- Telecommunications.
COMPUTERS -- Security -- General.
Telecommunication -- Security measures.
Form Electronic book
ISBN 9781439840375
1439840377