Communication System Security: Chapman & Hall/CRC Cryptography and Network Security Series
Autor Lidong Chen, Guang Gongen Limba Engleză Hardback – 29 mai 2012
Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms.
The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions.
Taking an evolutionary approach to security in today’s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios.
Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks.
With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis.
Din seria Chapman & Hall/CRC Cryptography and Network Security Series
- 20% Preț: 724.80 lei
- 20% Preț: 379.76 lei
- Preț: 362.47 lei
- 8% Preț: 411.41 lei
- Preț: 345.01 lei
- 9% Preț: 734.21 lei
- 31% Preț: 264.89 lei
- 9% Preț: 321.33 lei
- 23% Preț: 410.04 lei
- 30% Preț: 328.85 lei
- 20% Preț: 740.08 lei
- 18% Preț: 772.80 lei
- 20% Preț: 982.85 lei
- 26% Preț: 272.14 lei
- 26% Preț: 848.85 lei
Preț: 1323.97 lei
Preț vechi: 1614.60 lei
-18% Nou
Puncte Express: 1986
Preț estimativ în valută:
253.38€ • 263.20$ • 210.47£
253.38€ • 263.20$ • 210.47£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781439840368
ISBN-10: 1439840369
Pagini: 750
Ilustrații: 100 b/w images
Dimensiuni: 156 x 234 x 38 mm
Greutate: 1.15 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Chapman & Hall/CRC Cryptography and Network Security Series
ISBN-10: 1439840369
Pagini: 750
Ilustrații: 100 b/w images
Dimensiuni: 156 x 234 x 38 mm
Greutate: 1.15 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Chapman & Hall/CRC Cryptography and Network Security Series
Public țintă
Cryptography, electrical engineering, and computer science students and professionals.Cuprins
Introduction. PRACTICAL CRYPTOGRAPHY PRIMITIVES: Pseudorandom Sequence Generators. Design of Stream Ciphers. Design of Block Ciphers, Hash Functions, and MAC. Public-Key Cryptographic Algorithms. SECURITY MECHANISMS AND PROTOCOLS: Security Infrastructure. Establish Protected Communications. Network Security Protocols. WIRELESS SECURITY: Network Access Authentication. Wireless Network Security. Security for Mobility. Broadcast and Multicast Key Distribution and Authentication. SYSTEM SECURITY: Trusted Platform. Physical-Layer Security. Spread-Spectrum Techniques for Anti-Jamming Attacks. Appendices. Index.
Notă biografică
Lidong Chen is a mathematician in the Computer Security Division of the National Institute of Standards and Technology. She earned a Ph.D. in applied mathematics from Aarhus University. Dr. Chen was an associate editor of IEEE Communications Letters and has been a program committee member for numerous conferences in cryptography and security. Her research areas include cryptographic protocols, network security, and security in wireless and mobile applications.
Guang Gong is a professor in the Department of Electrical and Computer Engineering at the University of Waterloo. She earned a Ph.D. in electrical engineering. Dr. Gong has been an associate editor of several journals, a co-chair and committee member of technical programs and conferences, and a recipient of awards such as the NSERC Discovery Accelerator Supplement Award and the Ontario Research Fund-Research Excellence Award. Her research interests are in the areas of sequence design, cryptography, and communication security.
Guang Gong is a professor in the Department of Electrical and Computer Engineering at the University of Waterloo. She earned a Ph.D. in electrical engineering. Dr. Gong has been an associate editor of several journals, a co-chair and committee member of technical programs and conferences, and a recipient of awards such as the NSERC Discovery Accelerator Supplement Award and the Ontario Research Fund-Research Excellence Award. Her research interests are in the areas of sequence design, cryptography, and communication security.
Recenzii
"For mathematicians, both students and researchers, the book gives comprehensive information about practical aspects of cryptography. … Each chapter is supplied with an appropriate number of exercises. They are well chosen to demonstrate and clarify the considered topics. A rich (but not excessively large) bibliography is given at the end of each chapter. This organization of the book is quite handy for the reader."
—Nikolai L. Manev, Zentralblatt MATH 1263
—Nikolai L. Manev, Zentralblatt MATH 1263
Descriere
Helping current and future system designers take a more productive approach in the field, this text shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. The book includes many examples, figures, exercises, and projects and provides PowerPoint slides and other ancillaries on the author’s website. A solutions manual is available with qualifying course adoption.