HOME > 상세정보

상세정보

Mobile communication systems and security

Mobile communication systems and security (2회 대출)

자료유형
단행본
개인저자
Rhee, Man Young.
서명 / 저자사항
Mobile communication systems and security / Man Young Rhee.
발행사항
Singapore ;   Hoboken, NJ :   J. Wiley & Sons (Asia) ;   [Piscataway, NJ] :   IEEE Press ,   c2009.  
형태사항
xxxvi, 439 p. : ill. ; 26 cm.
ISBN
9780470823361 (cloth) 0470823364 (cloth)
서지주기
Includes bibliographical references (p. [417]-420) and index.
일반주제명
Mobile communication systems. Wireless communication systems. Mobile communication systems -- Security measures. Wireless communication systems -- Security measures.
000 01102camuu2200289 a 4500
001 000045570075
005 20100113155957
008 080701s2009 si a b 001 0 eng
010 ▼a 2008029106
020 ▼a 9780470823361 (cloth)
020 ▼a 0470823364 (cloth)
035 ▼a (KERIS)REF000015006619
040 ▼a DLC ▼c DLC ▼d BTCTA ▼d C#P ▼d BWX ▼d YDXCP ▼d DLC ▼d 211009
050 0 0 ▼a TK5103.2 ▼b .R47 2009
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b R469m
100 1 ▼a Rhee, Man Young.
245 1 0 ▼a Mobile communication systems and security / ▼c Man Young Rhee.
260 ▼a Singapore ; ▼a Hoboken, NJ : ▼b J. Wiley & Sons (Asia) ; ▼a [Piscataway, NJ] : ▼b IEEE Press , ▼c c2009.
300 ▼a xxxvi, 439 p. : ▼b ill. ; ▼c 26 cm.
504 ▼a Includes bibliographical references (p. [417]-420) and index.
650 0 ▼a Mobile communication systems.
650 0 ▼a Wireless communication systems.
650 0 ▼a Mobile communication systems ▼x Security measures.
650 0 ▼a Wireless communication systems ▼x Security measures.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 R469m 등록번호 121188591 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile systems operate and how to address complex security issues.

  • Written by a top expert in information security
  • Details each generation of cellular technology
  • Gives a clear understanding of wireless security protocol analysis
  • Offers complete coverage of various protocols and specifications in 3GPPs
  • Forecasts new features and promising technologies
  • Presents numerical examples in each chapter for easier understanding
  • Provides source code that can be used for individual practice

The book is ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Networking, Wireless Security, or Mobile Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of the security layer.

Access the source code and lecture materials at the companion website: (www.wiley.com/go/rhee)



New feature

Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile systems operate and how to address complex security issues.
  • Written by a top expert in information security
  • Details each generation of cellular technology
  • Gives a clear understanding of wireless security protocol analysis
  • Offers complete coverage of various protocols and specifications in 3GPPs
  • Forecasts new features and promising technologies
  • Presents numerical examples in each chapter for easier understanding
  • Provides pseudo code that can be used for individual practice

The book is ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Networking, Wireless Security, or Mobile Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of the security layer.

Access the supplementary materials at the companion website: (www.wiley.com/go/rhee)




정보제공 : Aladin

목차

Preface.

Acknowledgement.

About the Author.

Abbreviations.

1 Global System for Mobile Communications.

1.1 GSM Bandwidth Allocation.

1.2 GSM System Architecture.

1.3 GSM Transmission Network Architecture.

1.4 Signaling Channels on the Air Interface.

1.5 GSM Security Architecture.

2 cdmaOne IS-95A Technology.

2.1 Reverse CDMA Channel.

2.2 Forward CDMA Channel.

3 General Packet Radio Service (GPRS).

3.1 GPRS System Architecture.

3.2 GPRS Logical Functions.

3.3 Layered Protocol Architecture of Transmission Plane.

3.4 GPRS Ciphering Algorithm.

4 Third-generation Partnership Projects (3GPP and 3GPP2).

4.1 3G Partnership Projects.

4.2 Evolution of Mobile Radio Technologies.

4.3 Cryptographic Protocols Applicable to Wireless Security Technologies.

5 Universal Mobile Telecommunication System (UMTS).

5.1 UMTS Standardization.

5.2 FDD/TDD Modes for UTRA Operation.

5.3 UMTS Architecture.

5.4 UTRAN Architecture.

5.5 UTRAN Terrestrial Interface.

5.6 UTRAN-CN Interface via Iu.

5.7 UMTS Security Related Features.

5.8 UTRAN Overall Functions.

5.9 UTRAN Iub Interface Protocol Structure.

5.10 UTRAN Iur Interface Protocol Structure.

6 High Speed Downlink Packet Access (HSDPA).

6.1 Basic Structure of HS-DSCH.

6.2 Overview of HSDPA Enhancement Technologies.

6.3 HS-DSCH MAC Architecture—UE Side.

6.4 HS-DSCH MAC Architecture—UTRAN Side.

6.5 Overview of HSDPA Techniques to Support UTRA.

6.6 Orthogonal Frequency Division Multiplexing (OFDM).

6.7 Prospect of OFDM-based Applications.

7 CDMA2000 1x High Rate Packet Data System (1xEV-DO).

7.1 Architectural Reference Protocol Model.

7.2 Air Interface Layering Protocol.

7.3 Stream Layer Protocol.

7.4 Session Layer Protocol.

7.5 Connection Layer Protocol.

7.6 Security Layer Protocols.

7.7 MAC Layer Protocols.

7.8 Physical Layer Protocol.

8 CDMA2000 1x Evolution-Data and Voice (1xEV-DV).

8.1 UMTS (WCDMA) Versus CDMA2000—Physical Layer Harmonization.

8.2 Reverse CDMA Channel.

8.3 Forward CDMA Channel.

8.4 CDMA2000 Entities and Service Interfaces.

9 Advanced Encryption Standard and Elliptic Curve Cryptosystems.

9.1 Advanced Encryption Standard (AES).

9.2 Elliptic Curve Cryptosystem (ECC).

9.3 Elliptic Curve Cryptosystem versus Public-Key Cryptosystems.

10 Hash Function, Message Authentication Code, and Data Expansion Function.

10.1 MD5 Message-Digest Algorithm.

10.2 Secure Hash Algorithm (SHA-1).

10.3 Hashed Message Authentication Codes (HMAC).

10.4 Data Expansion Function.

Bibliography.

Index.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)