1.

Record Nr.

UNINA9911020219503321

Autore

Niemi Valtteri

Titolo

UMTS security / / by Valterri Niemi and Kaisa Nyberg

Pubbl/distr/stampa

Chichester, England, : John Wiley & Sons, 2003

ISBN

9786610269143

9781280269141

1280269146

9780470091586

0470091584

9780470091562

0470091568

Descrizione fisica

1 online resource (287 p.)

Altri autori (Persone)

NybergKaisa <1948->

Disciplina

005.8

Soggetti

Computer security

Computer networks - Security measures

Mobile communication systems - Security measures

Wireless communication systems - Security measures

Global system for mobile communications - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references (p. [257]-265) and index.

Nota di contenuto

Universal Mobile Telecommunications System Security; Contents; Preface; PART I: SECURITY ARCHITECTURE FOR UMTS; 1 Introduction to Security and to UMTS; 1.1 Security in Telecommunications; 1.1.1 General security principles; 1.1.2 GSM security; 1.2 The Background to 3G; 1.3 The 3G Partnership Project (3GPP); 1.4 3GPP Network Architecture; 1.4.1 Elements in the architecture; 1.4.2 Protocols in the 3GPP system; 1.5 WCDMA Radio Technology; 1.5.1 CDMA: an example; 1.5.2 Basic facts of WCDMA; 1.5.3 Handovers; 1.5.4 Power control; 2 UMTS Security Features in Release 1999; 2.1 Access Security to UMTS

2.1.1 Mutual authentication2.1.2 Temporary identities; 2.1.3 UTRAN encryption; 2.1.4 Integrity protection of RRC signalling; 2.1.5 Set-up of UTRAN security mechanisms; 2.1.6 Summary of access security in the CS and PS domains; 2.2 Interworking with GSM; 2.2.1 Interworking



scenarios; 2.2.2 Cases with SIM; 2.2.3 Cases with USIM; 2.2.4 Handovers from one system to another; 2.3 Additional Security Features in Release 1999; 2.3.1 Ciphering indicator; 2.3.2 Identification of the UE; 2.3.3 Security for Location Services (LCs); 2.3.4 User-to-USIM authentication

2.3.5 Security in the USIM application toolkit2.3.6 Mobile Execution Environment (MExE); 2.3.7 Lawful interception; 3 Security Features in Releases 4 and 5; 3.1 Network Domain Security; 3.1.1 MAPsec; 3.1.2 IPsec; 3.1.3 IPsec-based mechanisms in UMTS; 3.1.4 Role of firewalls; 3.2 IMS Security; 3.2.1 Basics of SIP; 3.2.2 IMS architecture; 3.2.3 Architecture for securing access to the IMS; 3.2.4 Principles for IMS access security; 3.2.5 Use of HTTP Digest AKA; 3.2.6 Security mode set-up; 3.2.7 Integrity protection with ESP; 3.2.8 Error case handling; 3.3 Other Security Systems

3.3.1 Higher layer security systems3.3.2 Link layer security systems; PART II: CRYPTOGRAPHIC ALGORITHMS; 4 Introduction to Cryptography; 4.1 The Science of Cryptology; 4.1.1 Cryptographic systems; 4.1.2 Security and vulnerability; 4.1.3 Developing cryptology into a publicly available science; 4.1.4 Public cryptographic development efforts; 4.2 Requirements and Analysis of Cryptographic Algorithms; 4.2.1 Block ciphers; 4.2.2 Stream ciphers; 4.2.3 Message authentication codes; 5 3GPP Algorithm Specification Principles; 6 Confidentiality and Integrity Algorithms

6.1 Requirements for the Confidentiality Algorithm6.1.1 Functional requirements; 6.1.2 Algorithm operation; 6.1.3 Interfaces to the algorithm; 6.2 Requirements for the Integrity Algorithm; 6.2.1 Overview; 6.2.2 Interface; 6.3 Design Task Force; 6.4 Getting Started; 6.4.1 SAGE contribution to SA3; 6.4.2 Modes around MISTY1; 6.4.3 Particular security criteria; 6.5 Design Process; 6.5.1 The teams; 6.5.2 Design documentation; 6.5.3 Conclusion of evaluation; 6.6 Confidentiality Algorithm; 6.6.1 The f8 stream cipher mode; 6.6.2 Description of f8; 6.6.3 Security

6.7 Extension of the UMTS Confidentiality Algorithm

Sommario/riassunto

Can you afford not to read this book?........ The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and phone users and numerous different radio access technologies will co-exist within the UMTS system's core network - security is, therefore, of the utmost importance. UMTS Security focuses on the standardized security features of UMTS and brings together material previously only available in specifications, design documents and presentations in one concise form. In addition, this unique volume also covers non-standard i



2.

Record Nr.

UNINA9910965285503321

Autore

Thomson Keith Stewart

Titolo

The legacy of the Mastodon : the golden age of fossils in America / / Keith Thomson

Pubbl/distr/stampa

New Haven, : Yale University Press, c2008

ISBN

1-282-08860-2

9786612088605

0-300-15184-5

Edizione

[1st ed.]

Descrizione fisica

1 online resource (424 p.)

Disciplina

560.973/09033

Soggetti

Mastodons - North America

Mammoths - North America

Mammals, Fossil - North America

Paleontology - North America

Paleontology - United States - History

Paleontology - United States - History - 18th century

Paleontology - United States - History - 19th century

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references (p. 345-369) and index.

Nota di contenuto

Pt. one: The Jeffersonians -- Fossil hunters on the frontier -- Big Bone Lick -- Franklin, Jefferson, and the incognitum -- Jefferson's "great-claw" and a world about to change -- The first American dinosaurs: an eighteenth-century mystery story -- Fossils and show business: Mr. Peale's Mastodon -- Pt. two: Fossils and geology -- Fossils and extinction: dangerous ideas -- Mary Anning's world -- An American natural science -- An American geology -- Bad lands: no time for ideas -- Dr. Leidy's dinosaur -- Ferdinand Vandiveer Hayden -- Pt. three: Giant Saurians and horned mammals -- Kansas and a new regime -- Entry of the gladiators -- Riding the rails -- The first Yale college expedition -- The competition begins -- Buffalo land: who was Professor Paleozoic? -- 1872: the year of conflict -- The case of the great horned mammals -- Going separate ways -- Two into four won't go -- To the Black Hills --  To the Judith River -- Pt. four: Toward the twentieth century -- The rise of dinosaurs -- The good, the bad, and



the ugly -- Going public -- 1890: the end of the beginning -- Appendixes -- The geological column -- Leidy on evolution -- Cope on evolution.

Sommario/riassunto

The uncovering in the mid-1700s of fossilized mastodon bones and teeth at Big Bone Lick, Kentucky, signaled the beginning of a great American adventure. The West was opening up and unexplored lands beckoned. Unimagined paleontological treasures awaited discovery: strange horned mammals, birds with teeth, flying reptiles, gigantic fish, diminutive ancestors of horses and camels, and more than a hundred different kinds of dinosaurs. This exciting book tells the story of the grandest period of fossil discovery in American history, the years from 1750 to 1890. The volume begins with Thomas Jefferson, whose keen interest in the American mastodon led him to champion the study of fossil vertebrates. The book continues with vivid descriptions of the actual work of prospecting for fossils--a pick in one hand, a rifle in the other--and enthralling portraits of Joseph Leidy, Ferdinand Hayden, Edward Cope, and Othniel Marsh among other major figures in the development of the science of paleontology. Shedding new light on these scientists' feuds and rivalries, on the connections between fossil studies in Europe and America, and on paleontology's contributions to America's developing national identity, The Legacy of the Mastodon is itself a fabulous discovery for every reader to treasure.