|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910877320103321 |
|
|
Autore |
Rhee Man Young |
|
|
Titolo |
Mobile communication systems and security / / Man Young Rhee |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore ; ; Hoboken, NJ, : J. Wiley & Sons (Asia) |
|
[Piscataway, NJ], : IEEE Press, c2009 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-282-38213-6 |
9786612382130 |
0-470-82339-9 |
0-470-82337-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (477 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Mobile communication systems |
Wireless communication systems |
Mobile communication systems - Security measures |
Wireless communication systems - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. [417]-420) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Global system for mobile communications -- cdmaOne IS-95A technology -- General packet radio service (GPRS) -- Third-generation partnership projects (3GPP and 3GPP2) -- Universal mobile telecommunication system (UMTS) -- High speed downlink packet access (HSDPA) -- CDMA2000 1x high rate packet data system (1xEV-DO) -- CDMA2000 1x evolution-data and voice (1xEV-DV) -- Advanced encryption standard and elliptic curve cryptosystems -- Hash function, message authentication code, and data expansion function. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an |
|
|
|
|