Bültmann & Gerriets
Communication System Security
von Lidong Chen, Guang Gong
Verlag: Taylor & Francis
E-Book / PDF
Kopierschutz: kein Kopierschutz


Speicherplatz: 7 MB
Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-1-4398-4037-5
Auflage: 1. Auflage
Erschienen am 29.05.2012
Sprache: Englisch
Umfang: 750 Seiten

Preis: 250,99 €

Klappentext
Biografische Anmerkung
Inhaltsverzeichnis

Helping current and future system designers take a more productive approach in the field, this text shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. The book includes many examples, figures, exercises, and projects and provides PowerPoint slides and other ancillaries on the author's website. A solutions manual is available with qualifying course adoption.



Lidong Chen is a mathematician in the Computer Security Division of the National Institute of Standards and Technology. She earned a Ph.D. in applied mathematics from Aarhus University. Dr. Chen was an associate editor of IEEE Communications Letters and has been a program committee member for numerous conferences in cryptography and security. Her research areas include cryptographic protocols, network security, and security in wireless and mobile applications.

Guang Gong is a professor in the Department of Electrical and Computer Engineering at the University of Waterloo. She earned a Ph.D. in electrical engineering. Dr. Gong has been an associate editor of several journals, a co-chair and committee member of technical programs and conferences, and a recipient of awards such as the NSERC Discovery Accelerator Supplement Award and the Ontario Research Fund-Research Excellence Award. Her research interests are in the areas of sequence design, cryptography, and communication security.



Introduction. PRACTICAL CRYPTOGRAPHY PRIMITIVES: Pseudorandom Sequence Generators. Design of Stream Ciphers. Design of Block Ciphers, Hash Functions, and MAC. Public-Key Cryptographic Algorithms. SECURITY MECHANISMS AND PROTOCOLS: Security Infrastructure. Establish Protected Communications. Network Security Protocols. WIRELESS SECURITY: Network Access Authentication. Wireless Network Security. Security for Mobility. Broadcast and Multicast Key Distribution and Authentication. SYSTEM SECURITY: Trusted Platform. Physical-Layer Security. Spread-Spectrum Techniques for Anti-Jamming Attacks. Appendices. Index.


andere Formate