| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911020219503321 |
|
|
Autore |
Niemi Valtteri |
|
|
Titolo |
UMTS security / / by Valterri Niemi and Kaisa Nyberg |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, England, : John Wiley & Sons, 2003 |
|
|
|
|
|
|
|
ISBN |
|
9786610269143 |
9781280269141 |
1280269146 |
9780470091586 |
0470091584 |
9780470091562 |
0470091568 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (287 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer networks - Security measures |
Mobile communication systems - Security measures |
Wireless communication systems - Security measures |
Global system for mobile communications - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. [257]-265) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Universal Mobile Telecommunications System Security; Contents; Preface; PART I: SECURITY ARCHITECTURE FOR UMTS; 1 Introduction to Security and to UMTS; 1.1 Security in Telecommunications; 1.1.1 General security principles; 1.1.2 GSM security; 1.2 The Background to 3G; 1.3 The 3G Partnership Project (3GPP); 1.4 3GPP Network Architecture; 1.4.1 Elements in the architecture; 1.4.2 Protocols in the 3GPP system; 1.5 WCDMA Radio Technology; 1.5.1 CDMA: an example; 1.5.2 Basic facts of WCDMA; 1.5.3 Handovers; 1.5.4 Power control; 2 UMTS Security Features in Release 1999; 2.1 Access Security to UMTS |
2.1.1 Mutual authentication2.1.2 Temporary identities; 2.1.3 UTRAN encryption; 2.1.4 Integrity protection of RRC signalling; 2.1.5 Set-up of UTRAN security mechanisms; 2.1.6 Summary of access security in the CS and PS domains; 2.2 Interworking with GSM; 2.2.1 Interworking |
|
|
|
|
|
|
|
|
|
|
|
scenarios; 2.2.2 Cases with SIM; 2.2.3 Cases with USIM; 2.2.4 Handovers from one system to another; 2.3 Additional Security Features in Release 1999; 2.3.1 Ciphering indicator; 2.3.2 Identification of the UE; 2.3.3 Security for Location Services (LCs); 2.3.4 User-to-USIM authentication |
2.3.5 Security in the USIM application toolkit2.3.6 Mobile Execution Environment (MExE); 2.3.7 Lawful interception; 3 Security Features in Releases 4 and 5; 3.1 Network Domain Security; 3.1.1 MAPsec; 3.1.2 IPsec; 3.1.3 IPsec-based mechanisms in UMTS; 3.1.4 Role of firewalls; 3.2 IMS Security; 3.2.1 Basics of SIP; 3.2.2 IMS architecture; 3.2.3 Architecture for securing access to the IMS; 3.2.4 Principles for IMS access security; 3.2.5 Use of HTTP Digest AKA; 3.2.6 Security mode set-up; 3.2.7 Integrity protection with ESP; 3.2.8 Error case handling; 3.3 Other Security Systems |
3.3.1 Higher layer security systems3.3.2 Link layer security systems; PART II: CRYPTOGRAPHIC ALGORITHMS; 4 Introduction to Cryptography; 4.1 The Science of Cryptology; 4.1.1 Cryptographic systems; 4.1.2 Security and vulnerability; 4.1.3 Developing cryptology into a publicly available science; 4.1.4 Public cryptographic development efforts; 4.2 Requirements and Analysis of Cryptographic Algorithms; 4.2.1 Block ciphers; 4.2.2 Stream ciphers; 4.2.3 Message authentication codes; 5 3GPP Algorithm Specification Principles; 6 Confidentiality and Integrity Algorithms |
6.1 Requirements for the Confidentiality Algorithm6.1.1 Functional requirements; 6.1.2 Algorithm operation; 6.1.3 Interfaces to the algorithm; 6.2 Requirements for the Integrity Algorithm; 6.2.1 Overview; 6.2.2 Interface; 6.3 Design Task Force; 6.4 Getting Started; 6.4.1 SAGE contribution to SA3; 6.4.2 Modes around MISTY1; 6.4.3 Particular security criteria; 6.5 Design Process; 6.5.1 The teams; 6.5.2 Design documentation; 6.5.3 Conclusion of evaluation; 6.6 Confidentiality Algorithm; 6.6.1 The f8 stream cipher mode; 6.6.2 Description of f8; 6.6.3 Security |
6.7 Extension of the UMTS Confidentiality Algorithm |
|
|
|
|
|
|
Sommario/riassunto |
|
Can you afford not to read this book?........ The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and phone users and numerous different radio access technologies will co-exist within the UMTS system's core network - security is, therefore, of the utmost importance. UMTS Security focuses on the standardized security features of UMTS and brings together material previously only available in specifications, design documents and presentations in one concise form. In addition, this unique volume also covers non-standard i |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910965285503321 |
|
|
Autore |
Thomson Keith Stewart |
|
|
Titolo |
The legacy of the Mastodon : the golden age of fossils in America / / Keith Thomson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New Haven, : Yale University Press, c2008 |
|
|
|
|
|
|
|
ISBN |
|
1-282-08860-2 |
9786612088605 |
0-300-15184-5 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (424 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Mastodons - North America |
Mammoths - North America |
Mammals, Fossil - North America |
Paleontology - North America |
Paleontology - United States - History |
Paleontology - United States - History - 18th century |
Paleontology - United States - History - 19th century |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. 345-369) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Pt. one: The Jeffersonians -- Fossil hunters on the frontier -- Big Bone Lick -- Franklin, Jefferson, and the incognitum -- Jefferson's "great-claw" and a world about to change -- The first American dinosaurs: an eighteenth-century mystery story -- Fossils and show business: Mr. Peale's Mastodon -- Pt. two: Fossils and geology -- Fossils and extinction: dangerous ideas -- Mary Anning's world -- An American natural science -- An American geology -- Bad lands: no time for ideas -- Dr. Leidy's dinosaur -- Ferdinand Vandiveer Hayden -- Pt. three: Giant Saurians and horned mammals -- Kansas and a new regime -- Entry of the gladiators -- Riding the rails -- The first Yale college expedition -- The competition begins -- Buffalo land: who was Professor Paleozoic? -- 1872: the year of conflict -- The case of the great horned mammals -- Going separate ways -- Two into four won't go -- To the Black Hills -- To the Judith River -- Pt. four: Toward the twentieth century -- The rise of dinosaurs -- The good, the bad, and |
|
|
|
|
|
|
|
|
|
|
|
the ugly -- Going public -- 1890: the end of the beginning -- Appendixes -- The geological column -- Leidy on evolution -- Cope on evolution. |
|
|
|
|
|
|
Sommario/riassunto |
|
The uncovering in the mid-1700s of fossilized mastodon bones and teeth at Big Bone Lick, Kentucky, signaled the beginning of a great American adventure. The West was opening up and unexplored lands beckoned. Unimagined paleontological treasures awaited discovery: strange horned mammals, birds with teeth, flying reptiles, gigantic fish, diminutive ancestors of horses and camels, and more than a hundred different kinds of dinosaurs. This exciting book tells the story of the grandest period of fossil discovery in American history, the years from 1750 to 1890. The volume begins with Thomas Jefferson, whose keen interest in the American mastodon led him to champion the study of fossil vertebrates. The book continues with vivid descriptions of the actual work of prospecting for fossils--a pick in one hand, a rifle in the other--and enthralling portraits of Joseph Leidy, Ferdinand Hayden, Edward Cope, and Othniel Marsh among other major figures in the development of the science of paleontology. Shedding new light on these scientists' feuds and rivalries, on the connections between fossil studies in Europe and America, and on paleontology's contributions to America's developing national identity, The Legacy of the Mastodon is itself a fabulous discovery for every reader to treasure. |
|
|
|
|
|
|
|
| |