|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910958502103321 |
|
|
Autore |
Chen Lidong |
|
|
Titolo |
Communication system security / / by Lidong Chen and Guang Gong |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2012 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9781040056653 |
1040056652 |
9780429094293 |
0429094299 |
9781439840368 |
1439840369 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (738 p.) |
|
|
|
|
|
|
Collana |
|
Chapman & Hall/CRC Cryptography and Network Security |
A Chapman & Hall Book |
|
|
|
|
|
|
|
|
Classificazione |
|
COM046000COM083000TEC061000 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication - Security measures |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Preface; Acknowledgments; 1. Introduction; I. Practical Cryptography Primitives; 2. Pseudorandom Sequence Generators; 3. Design of Stream Ciphers; 4. Design of Block Ciphers, Hash Functions, and MAC; 5. Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. Security Infrastructure; 7. Establish Protected Communications; 8. Network Security Protocols; III. Wireless Security; 9. Network Access Authentication; 10. Wireless Network Security; 11. Security for Mobility; 12. Broadcast and Multicast Key Distribution and Authentication |
IV. System Security13. Trusted Platform; 14. Physical-Layer Security; 15. Spread-Spectrum Techniques for Anti-Jamming-Attacks; APPENDICES; A. Computations in Finite Fields; B. Some Mathematical Formulae; C. Signals and Spectra in Physical Layer |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain |
|
|
|
|