LEADER 03099nam 2200637I 450 001 9910792138303321 005 20200520144314.0 010 $a0-429-09429-9 010 $a1-4398-4036-9 035 $a(CKB)2560000000251379 035 $a(EBL)1575384 035 $a(SSID)ssj0001111022 035 $a(PQKBManifestationID)11639683 035 $a(PQKBTitleCode)TC0001111022 035 $a(PQKBWorkID)11128456 035 $a(PQKB)10780413 035 $a(Au-PeEL)EBL1575384 035 $a(CaPaEBR)ebr11167023 035 $a(OCoLC)902693366 035 $a(OCoLC)860805565 035 $a(CaSebORM)9781439840375 035 $a(MiAaPQ)EBC1575384 035 $a(EXLCZ)992560000000251379 100 $a20180611d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCommunication system security /$fby Lidong Chen and Guang Gong 205 $a1st edition 210 1$aBoca Raton, FL :$cChapman and Hall/CRC, an imprint of Taylor and Francis,$d2012. 215 $a1 online resource (738 p.) 225 1 $aChapman & Hall/CRC Cryptography and Network Security 225 0 $aA Chapman & Hall Book 300 $aDescription based upon print version of record. 311 $a1-4398-4037-7 311 $a1-322-61613-2 320 $aIncludes bibliographical references at the end of each chapters. 327 $aFront Cover; Contents; Preface; Acknowledgments; 1. Introduction; I. Practical Cryptography Primitives; 2. Pseudorandom Sequence Generators; 3. Design of Stream Ciphers; 4. Design of Block Ciphers, Hash Functions, and MAC; 5. Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. Security Infrastructure; 7. Establish Protected Communications; 8. Network Security Protocols; III. Wireless Security; 9. Network Access Authentication; 10. Wireless Network Security; 11. Security for Mobility; 12. Broadcast and Multicast Key Distribution and Authentication 327 $aIV. System Security13. Trusted Platform; 14. Physical-Layer Security; 15. Spread-Spectrum Techniques for Anti-Jamming-Attacks; APPENDICES; A. Computations in Finite Fields; B. Some Mathematical Formulae; C. Signals and Spectra in Physical Layer 330 3 $aHelping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. 410 0$aChapman & Hall/CRC cryptography and network security. 606 $aTelecommunication$xSecurity measures 615 0$aTelecommunication$xSecurity measures. 676 $a621.389/28 686 $aCOM046000$aCOM083000$aTEC061000$2bisacsh 700 $aChen$b Lidong$01579887 702 $aGong$b Guang$f1956- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910792138303321 996 $aCommunication system security$93860277 997 $aUNINA