top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
Autore Nakhjiri Madjid
Edizione [1st edition]
Pubbl/distr/stampa Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Descrizione fisica 1 online resource (319 p.)
Disciplina 004.62
005.8
Altri autori (Persone) NakhjiriMahsa
Soggetto topico Wireless Internet - Security measures
Mobile computing - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-24272-8
9786610242726
0-470-01746-5
0-470-01745-7
Classificazione 54.32
53.72
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols
1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms
2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport
3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security
4.2 Internet Protocol Security
Record Nr. UNINA-9910143692503321
Nakhjiri Madjid  
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
Autore Nakhjiri Madjid
Edizione [1st edition]
Pubbl/distr/stampa Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Descrizione fisica 1 online resource (319 p.)
Disciplina 004.62
005.8
Altri autori (Persone) NakhjiriMahsa
Soggetto topico Wireless Internet - Security measures
Mobile computing - Security measures
ISBN 1-280-24272-8
9786610242726
0-470-01746-5
0-470-01745-7
Classificazione 54.32
53.72
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols
1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms
2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport
3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security
4.2 Internet Protocol Security
Record Nr. UNINA-9910830716303321
Nakhjiri Madjid  
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
AAA and network security for mobile access [[electronic resource] ] : radius, diameter, EAP, PKI and IP mobility / / Madjid Nakhjiri and Mahsa Nakhjiri
Autore Nakhjiri Madjid
Edizione [1st edition]
Pubbl/distr/stampa Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Descrizione fisica 1 online resource (319 p.)
Disciplina 004.62
005.8
Altri autori (Persone) NakhjiriMahsa
Soggetto topico Wireless Internet - Security measures
Mobile computing - Security measures
ISBN 1-280-24272-8
9786610242726
0-470-01746-5
0-470-01745-7
Classificazione 54.32
53.72
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AAA AND NETWORK SECURITY FOR MOBILE ACCESS; Contents; Foreword; Preface; About the Author; Chapter 1 The 3 "A"s: Authentication, Authorization, Accounting; 1.1 Authentication Concepts; 1.1.1 Client Authentication; 1.1.2 Message Authentication; 1.1.3 Mutual Authentication; 1.1.4 Models for Authentication Messaging; 1.1.4.1 Two-Party Authentication Model; 1.1.4.2 Three-Party Authentication Model; 1.1.5 AAA Protocols for Authentication Messaging; 1.1.5.1 User-AAA Server; 1.1.5.2 NAS-AAA Server Communications; 1.1.5.3 Supplicant (User)-NAS Communications; 1.2 Authorization
1.2.1 How is it Different from Authentication?1.2.2 Administration Domain and Relationships with the User; 1.2.3 Standardization of Authorization Procedures; 1.2.3.1 Authorization Messaging; 1.2.3.2 Policy Framework and Authorization; 1.3 Accounting; 1.3.1 Accounting Management Architecture; 1.3.1.1 Accounting Across Administrative Domains; 1.3.2 Models for Collection of Accounting Data; 1.3.2.1 Polling Models for Accounting; 1.3.2.2 Event-Driven Models for Accounting; 1.3.3 Accounting Security; 1.3.4 Accounting Reliability; 1.3.4.1 Interim Accounting; 1.3.4.2 Transport Protocols
1.3.4.3 Fail-Over Mechanisms1.3.5 Prepaid Service: Authorization and Accounting in Harmony; 1.4 Generic AAA Architecture; 1.4.1 Requirements on AAA Protocols Running on NAS; 1.5 Conclusions and Further Resources; 1.6 References; Chapter 2 Authentication; 2.1 Examples of Authentication Mechanisms; 2.1.1 User Authentication Mechanisms; 2.1.1.1 Basic PPP User Authentication Mechanisms; 2.1.1.2 Shortcoming of PPP Authentication Methods; 2.1.1.3 Extensible Authentication Protocol (EAP) as Extension to PPP; 2.1.1.4 SIM-Based Authentication; 2.1.2 Example of Device Authentication Mechanisms
2.1.2.1 Public Key Certificate-Based Authentication2.1.2.2 Basics of Certificate-Based Authentication; 2.1.3 Examples of Message Authentication Mechanisms; 2.1.3.1 HMAC-MD5; 2.2 Classes of Authentication Mechanisms; 2.2.1 Generic Authentication Mechanisms; 2.2.1.1 Extensible Authentication Protocol (EAP); 2.2.1.2 EAP Messaging; 2.3 Further Resources; 2.4 References; Chapter 3 Key Management Methods; 3.1 Key Management Taxonomy; 3.1.1 Key Management Terminology; 3.1.2 Types of Cryptographic Algorithms; 3.1.3 Key Management Functions; 3.1.4 Key Establishment Methods; 3.1.4.1 Key Transport
3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security
4.2 Internet Protocol Security
Record Nr. UNINA-9910841162303321
Nakhjiri Madjid  
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Host Identity Protocol (HIP) : towards the secure mobile Internet / / Andrei Gurtov
Host Identity Protocol (HIP) : towards the secure mobile Internet / / Andrei Gurtov
Autore Gurtov Andrei
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , 2008
Descrizione fisica 1 online resource (323 p.)
Disciplina 004.62
005.8
Collana Wiley series on communications networking & distributed systems
Wiley series in communications networking & distributed systems
Soggetto topico Wireless Internet - Security measures
Host Identity Protocol (Computer network protocol)
ISBN 1-281-84107-2
9786611841072
0-470-77289-1
0-470-77290-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword / Jari Arkko -- Foreword / David Hutchison -- Introduction to network security -- Architectural overview -- Base protocol -- Main extensions -- Advanced extensions -- Performance measurements -- Lightweight HIP -- Infrastructure support -- Middlebox traversal -- Name resolution -- Micromobility -- Communication privacy -- Possible HIP applications -- Application interface -- Integrating HIP with other protocols -- Installing and using HIP.
Record Nr. UNINA-9910144117003321
Gurtov Andrei  
Chichester, U.K. : , : Wiley, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Host Identity Protocol (HIP) : towards the secure mobile Internet / / Andrei Gurtov
Host Identity Protocol (HIP) : towards the secure mobile Internet / / Andrei Gurtov
Autore Gurtov Andrei
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , 2008
Descrizione fisica 1 online resource (323 p.)
Disciplina 004.62
005.8
Collana Wiley series on communications networking & distributed systems
Wiley series in communications networking & distributed systems
Soggetto topico Wireless Internet - Security measures
Host Identity Protocol (Computer network protocol)
ISBN 1-281-84107-2
9786611841072
0-470-77289-1
0-470-77290-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword / Jari Arkko -- Foreword / David Hutchison -- Introduction to network security -- Architectural overview -- Base protocol -- Main extensions -- Advanced extensions -- Performance measurements -- Lightweight HIP -- Infrastructure support -- Middlebox traversal -- Name resolution -- Micromobility -- Communication privacy -- Possible HIP applications -- Application interface -- Integrating HIP with other protocols -- Installing and using HIP.
Record Nr. UNINA-9910830105703321
Gurtov Andrei  
Chichester, U.K. : , : Wiley, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing your wireless network [[electronic resource]]
Securing your wireless network [[electronic resource]]
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2006]
Descrizione fisica 4 unnumbered pages : digital, PDF file
Collana FTC facts for consumers
Soggetto topico Wireless Internet - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910697797903321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2006]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless mobile internet security / / Man Young Rhee, Endowed Chair Professor, Kyung Hee University, Professor Emeritus, Hanyang University, Republic of Korea
Wireless mobile internet security / / Man Young Rhee, Endowed Chair Professor, Kyung Hee University, Professor Emeritus, Hanyang University, Republic of Korea
Autore Rhee Man Young
Edizione [2nd ed.]
Pubbl/distr/stampa Chichester, West Sussex, United Kingdom : , : Wiley, A John Wiley & Sons Ltd., Publication, , 2013
Descrizione fisica 1 online resource (523 p.)
Disciplina 004.67/8
Soggetto topico Wireless Internet - Security measures
ISBN 1-118-51292-8
1-118-51294-4
1-299-44942-5
1-118-51299-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.
7.6 Certificate Revocation List 282 -- 7.7 Certification Path Validation 287 -- 8 Network Layer Security 291 -- 8.1 IPsec Protocol 291 -- 8.2 IP Authentication Header 299 -- 8.3 IP ESP 301 -- 8.4 Key Management Protocol for IPsec 308 -- 9 Transport Layer Security: SSLv3 and TLSv1 325 -- 9.1 SSL Protocol 325 -- 9.2 Cryptographic Computations 338 -- 9.3 TLS Protocol 339 -- 10 Electronic Mail Security: PGP, S/MIME 353 -- 10.1 PGP 353 -- 10.2 S/MIME 372 -- 11 Internet Firewalls for Trusted Systems 387 -- 11.1 Role of Firewalls 387 -- 11.2 Firewall-Related Terminology 388 -- 11.3 Types of Firewalls 392 -- 11.4 Firewall Designs 398 -- 11.5 IDS Against Cyber Attacks 401 -- 11.6 Intrusion Detections Systems 404 -- 12 SET for E-Commerce Transactions 415 -- 12.1 Business Requirements for SET 415 -- 12.2 SET System Participants 417 -- 12.3 Cryptographic Operation Principles 418 -- 12.4 Dual Signature and Signature Verification 420 -- 12.5 Authentication and Message Integrity 424 -- 12.6 Payment Processing 427 -- 13 4G Wireless Internet Communication Technology 439 -- 13.1 Mobile WiMAX 440 -- 13.2 WiBro (Wireless Broadband) 448 -- 13.3 UMB (Ultra Mobile Broadband) 452 -- 13.4 LTE (Long Term Evolution) 457 -- Acronyms 467 -- Bibliography 473 -- Index 481.
Record Nr. UNINA-9910139023703321
Rhee Man Young  
Chichester, West Sussex, United Kingdom : , : Wiley, A John Wiley & Sons Ltd., Publication, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless mobile internet security / / Man Young Rhee, Endowed Chair Professor, Kyung Hee University, Professor Emeritus, Hanyang University, Republic of Korea
Wireless mobile internet security / / Man Young Rhee, Endowed Chair Professor, Kyung Hee University, Professor Emeritus, Hanyang University, Republic of Korea
Autore Rhee Man Young
Edizione [2nd ed.]
Pubbl/distr/stampa Chichester, West Sussex, United Kingdom : , : Wiley, A John Wiley & Sons Ltd., Publication, , 2013
Descrizione fisica 1 online resource (523 p.)
Disciplina 004.67/8
Soggetto topico Wireless Internet - Security measures
ISBN 1-118-51292-8
1-118-51294-4
1-299-44942-5
1-118-51299-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.
7.6 Certificate Revocation List 282 -- 7.7 Certification Path Validation 287 -- 8 Network Layer Security 291 -- 8.1 IPsec Protocol 291 -- 8.2 IP Authentication Header 299 -- 8.3 IP ESP 301 -- 8.4 Key Management Protocol for IPsec 308 -- 9 Transport Layer Security: SSLv3 and TLSv1 325 -- 9.1 SSL Protocol 325 -- 9.2 Cryptographic Computations 338 -- 9.3 TLS Protocol 339 -- 10 Electronic Mail Security: PGP, S/MIME 353 -- 10.1 PGP 353 -- 10.2 S/MIME 372 -- 11 Internet Firewalls for Trusted Systems 387 -- 11.1 Role of Firewalls 387 -- 11.2 Firewall-Related Terminology 388 -- 11.3 Types of Firewalls 392 -- 11.4 Firewall Designs 398 -- 11.5 IDS Against Cyber Attacks 401 -- 11.6 Intrusion Detections Systems 404 -- 12 SET for E-Commerce Transactions 415 -- 12.1 Business Requirements for SET 415 -- 12.2 SET System Participants 417 -- 12.3 Cryptographic Operation Principles 418 -- 12.4 Dual Signature and Signature Verification 420 -- 12.5 Authentication and Message Integrity 424 -- 12.6 Payment Processing 427 -- 13 4G Wireless Internet Communication Technology 439 -- 13.1 Mobile WiMAX 440 -- 13.2 WiBro (Wireless Broadband) 448 -- 13.3 UMB (Ultra Mobile Broadband) 452 -- 13.4 LTE (Long Term Evolution) 457 -- Acronyms 467 -- Bibliography 473 -- Index 481.
Record Nr. UNINA-9910809381503321
Rhee Man Young  
Chichester, West Sussex, United Kingdom : , : Wiley, A John Wiley & Sons Ltd., Publication, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui