1.

Record Nr.

UNINA990004701170403321

Autore

Homerus <8. sec. a. C.>

Titolo

Dieghesis / Omero ; a cura di Marcello Gigante e Fabio Bonino

Pubbl/distr/stampa

Napoli : Morano, 1973

Descrizione fisica

237 p. ; 24 cm

Collana

Iresione ; 1 : collana di antologie di autori antichi diretta da Marcello Gigante

Locazione

FLFBC

Collocazione

P2B-610-HOM.-8G.M.-1973

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910789376003321

Autore

Prasad Anand

Titolo

Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad and Seung-Woo Seo

Pubbl/distr/stampa

Gistrup, Denmark : , : River Publishers, , [2011]

©2011

ISBN

1-00-333939-5

1-000-79538-1

1-003-33939-5

1-000-79269-2

87-92982-86-7

Descrizione fisica

1 online resource (242 p.)

Collana

River Publishers Series in Standardisation ; ; Volume 4

Disciplina

005.8

Soggetti

IEEE 802.16 (Standard)

Long-Term Evolution (Telecommunications)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.



Nota di bibliografia

Includes bibliographical references at the end of each chapters and index.

Nota di contenuto

""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature""

""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP""

""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX Forum®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility""

""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum""

""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1""

""5.2.3 PKMv2""

Sommario/riassunto

This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS).



3.

Record Nr.

UNINA9910810236303321

Autore

Braut-Hegghammer Målfrid

Titolo

Unclear physics : why Iraq and Libya failed to build nuclear weapons / / Malfrid Braut-Hegghammer

Pubbl/distr/stampa

Ithaca, New York ; ; London, [England] : , : Cornell University Press, , 2016

©2016

ISBN

1-5017-0645-4

1-5017-0590-3

Descrizione fisica

1 online resource (289 p.)

Collana

Cornell Studies in Security Affairs

Disciplina

623.4511909567

Soggetti

Nuclear weapons - Political aspects - Iraq

Nuclear weapons - Political aspects - Libya

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Frontmatter -- Contents -- Illustrations -- Acknowledgments -- Introduction -- Part I. Iraq -- 1. Iraq Explores the Atom, 1956-1973 -- 2. Ambiguity and Ambition, 1973-1981 -- 3. Saddam's Nuclear Weapons Program, 1981-1987 -- 4. Crises and a Crash Program, 1988-1991 -- Part II. Libya -- 5. Searching for Uranium in Libya, 1951-1973 -- 6. Cultural Revolution and Nuclear Power, 1973-1981 -- 7. Nuclear Weapons Remain Elusive, 1982-1989 -- 8. Sanctions, Centrifuges, and Exit, 1989-2003 -- Conclusion -- Notes -- Index

Sommario/riassunto

Many authoritarian leaders want nuclear weapons, but few manage to acquire them. Autocrats seeking nuclear weapons fail in different ways and to varying degrees-Iraq almost managed it; Libya did not come close. In Unclear Physics, Malfrid Braut-Hegghammer compares the two failed nuclear weapons programs, showing that state capacity played a crucial role in the trajectory and outcomes of both projects. Braut-Hegghammer draws on a rich set of new primary sources, collected during years of research in archives, fieldwork across the Middle East, and interviews with scientists and decision makers from both states. She gained access to documents and individuals that no other researcher has been able to consult. Her book tells the story of the Iraqi and Libyan programs from their origins in the late 1950s and 1960s



until their dismantling.This book reveals contemporary perspectives from scientists and regime officials on the opportunities and challenges facing each project. Many of the findings challenge the conventional wisdom about clandestine weapons programs in closed authoritarian states and their prospects of success or failure. Braut-Hegghammer suggests that scholars and analysts ought to pay closer attention to how state capacity affects nuclear weapons programs in other authoritarian regimes, both in terms of questioning the actual control these leaders have over their nuclear weapons programs and the capability of their scientists to solve complex technical challenges.