Wireless communications security:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Artech House
2006
|
Schriftenreihe: | Universal personal communications
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XI, 179 S. graph. Darst. 23 cm |
ISBN: | 1580535208 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022204092 | ||
003 | DE-604 | ||
005 | 20070103 | ||
007 | t | ||
008 | 061222s2006 xxud||| |||| 00||| eng d | ||
010 | |a 2005053075 | ||
020 | |a 1580535208 |c alk. paper |9 1-58053-520-8 | ||
035 | |a (OCoLC)61451680 | ||
035 | |a (DE-599)BVBBV022204092 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-29T |a DE-634 | ||
050 | 0 | |a TK5103.2 | |
082 | 0 | |a 621.384 |2 22 | |
100 | 1 | |a Imai, Hideki |d 1943- |e Verfasser |0 (DE-588)121605256 |4 aut | |
245 | 1 | 0 | |a Wireless communications security |c Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara |
264 | 1 | |a Boston [u.a.] |b Artech House |c 2006 | |
300 | |a XI, 179 S. |b graph. Darst. |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Universal personal communications | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Mobile communication systems |x Security measures | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a WAP |0 (DE-588)4596465-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobilfunk |0 (DE-588)4170280-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobilfunk |0 (DE-588)4170280-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a WAP |0 (DE-588)4596465-8 |D s |
689 | 0 | 3 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Rahman, Mohammad Ghulam |e Verfasser |4 aut | |
700 | 1 | |a Kobara, Kazukuni |e Verfasser |4 aut | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015415508&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015415508 |
Datensatz im Suchindex
_version_ | 1804136180795572224 |
---|---|
adam_text | WIRELESS COMMUNICATIONS SECURITY HIDEKI IMAI MOHAMMAD GHULAM RAHMAN
KAZUKUNI KOBARA ARTECH HOUSE BOSTON|LONDON ARTECHHOUSE.COM CONTENTS
PREFACE XI 1 2 2.1 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.3 2.4 2.5 2.5.1 2.5.2
2.5.3 2.5.4 2.5.5 INTRODUCTION CRYPTOGRAPHY INTRODUCTION BASIC CONCEPTS
CIPHERTEXT AND PLAINTEXT TYPES OF CRYPTOSYSTEMS GOALS OF A CRYPTOSYSTEM
SECURITY SYMMETRIC ENCRYPTION SCHEMES PERFECT SECRECY: THE ONE-TIME PAD
BLOCK CIPHERS PERMUTATION SUBSTITUTION DIFFUSION/CONFUSION SP NETWORKS
BASIC STRUCTURE 1 5 5 5 5 6 7 8 9 9 II 11 12 13 14 14 IFF 2.5.6 2.5.7
2.5.8 2.6 2.6.1 2.6.2 2.6.3 2.7 2.7.1 2.7.2 2.7.3 2.7.4 2.7.5 2.7.6
2.7.7 * 2.7.8 2.7.9 2.7.10 2.7.11 2.7.12 3 3.1 3.2 3.3 3.4 3.5 WIRELESS
COMMUNICATIONS SECURITY MODES OF USE DES AES STREAM CIPHERS ADVANTAGES
SECURITY REMARKS SOME EXAMPLES ASYMMETRIC CRYPTOSYSTEMS AND DIGITAL
SIGNATURES PUBLIC-KEY ENCRYPTION PUBLIC KEY INFRASTRUCTURE (PKI) AND
CERTIFICATE AUTHORITIES (CA) MATHEMATICAL BACKGROUND DIFFIE-HELLMAN KEY
AGREEMENT RSA CRYPTOSYSTEM ELGAMAL CRYPTOSYSTEM NECESSARY SECURITY FOR
PRACTICAL PUBLIC KEY ENCRYPTION SYSTEMS DIGITAL SIGNATURE MATHEMATICAL
BACKGROUND RSA SIGNATURE SCHEME DIGITAL SIGNATURE ALGORITHM (DSA)
NECESSARY SECURITY FOR PRACTICAL DIGITAL SIGNATURE SYSTEMS REFERENCES
SECURITY FEATURES IN WIRELESS ENVIRONMENT INTRODUCTION MOBILE NETWORK
ENVIRONMENT GENERAL SECURITY THREATS OF A NETWORK LIMITATIONS OF MOBILE
ENVIRONMENT MOBILITY AND SECURITY 15 17 18 19 20 20 21 21 22 23 25 27 28
29 31 32 33 35 36 36 38 41 41 42 44 45 46 CONTENTS VII 3.6 3.6.1 3.6.2
3.6.3 3.6.4 3.6.5 3.7 3.7.1 3.7.2 3.7.3 3.7.4 4 4.1 4.1.1 4.1.2 4.1.3
4.1.4 4.1.5 4.1.6 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.2.6 5 5.1 5.1.1
ATTACKS IN MOBILE ENVIRONMENT NUISANCE ATTACK IMPERSONATION ATTACK
INTERCEPTION ATTACK REPLAY ATTACK PARALLEL SESSION ATTACK SECURITY
ISSUES IN MOBILE ENVIRONMENT AUTHENTICATION ANONYMITY DEVICE
VULNERABILITY DOMAIN BOUNDARY CROSSING REFERENCES STANDARD PROTOCOLS
IEEE802.IL BRIEF HISTORY IEEE802.IL ARCHITECTURE IEEE802.1L LAYERS
SECURITY OF IEEE 802.11 KEY MANAGEMENT WEAKNESSES OF WEP BLUETOOTH
BLUETOOTH OVERVIEW BRIEF HISTORY BENEFITS BLUETOOTH ARCHITECTURE AND
COMPONENTS SECURITY OF BLUETOOTH PROBLEMS IN THE SECURITY OF BLUETOOTH
REFERENCE SECURITY IN 2G SYSTEMS GSM SYSTEM INTRODUCTION 46 47 48 48 48
48 49 49 50 52 52 53 55 55 55 56 60 62 69 70 72 72 73 74 76 78 89 90 91
92 92 VIII WIRELESS COMMUNICATIONS SECURITY 5.1.2 5.1.3 5.1.4 5.2 5.2.1
5.2.2 5.2.3 5.2.4 5.2.5 5.2.6 5.3 5.3.1 5.3.2 5.3.3 5.3.4 5.3.5 6 6.1
6.2 6.2.1 6.3 6.3.1 6,3.2 6.3.3 6.3.4 6.3.5 ARCHITECTURE OF THE GSM
NETWORK GSM SECURITY FEATURES ATTACKS ON GSM SECURITY I-MODE
INTRODUCTION INTRODUCTION I-MODE SYSTEM OVERVIEW SSL OVERVIEW PROTOCOL
STACK HTTP TUNNELING PROTOCOL POSTSCRIPT CDPD INTRODUCTION BASIC IDEA
BASIC INFRASTRUCTURE HOW A CDPD CONNECTION WORKS CDPD SECURITY
REFERENCES SECURITY IN 3G AND 4G SYSTEMS 3G WIRELESS COMMUNICATIONS
SYSTEMS THIRD GENERATION PARTNERSHIP PROJECT (3GPP) 3GPP SECURITY
OBJECTIVES 3G SECURITY ARCHITECTURE NETWORK ACCESS SECURITY NETWORK
DOMAIN SECURITY USER DOMAIN SECURITY PROVIDER-USER LINK SECURITY
VISIBILITY AND CONFIGURABILITY OF SECURITY 93 96 103 106 106 107 108 110
114 116 116 116 118 119 122 125 129 131 131 133 133 134 135 136 136 136
137 6.4 AUTHENTICATION AND KEY AGREEMENT (AKA) IN3GPP 137 6.5
CONFIDENTIALITY AND INTEGRITY 138 6.5.1 CONFIDENTIALITY 139 CONTENTS IX
6.5.2 6.6 7 7.1 7.2 7.3 7.3.1 7.3.2 7.4 7.4.1 7.4.2 7.4.3 7.5 7.5.1
7.5.2 7.5.3 7.5.4 1.6 7.7 DATA INTEGRITY 4G WIRELESS COMMUNICATIONS
SYSTEMS REFERENCES WIRELESS APPLICATION PROTOCOL (WAP) INTRODUCTION WAP
PROTOCOL STACK WAP PKI MODEL WTLS CLASS 2 WTLS CLASS 3 AND SIGNTEXT
CIPHER SUITE IN WTLS KEY EXCHANGE SUITE ELLIPTIC CURVE PARAMETERS IN
WTLS BULK ENCRYPTION AND MAC SUITE WAP-PROFILED TLS CIPHER SUITES
SESSION ID AND SESSION RESUME SERVER/CLIENT AUTHENTICATION AND
CERTIFICATE TLS TUNNELING WAP IDENTITY MODULE FURTHER INFORMATION
REFERENCES ABOUT THE AUTHORS INDEX 140 141 142 143 143 144 147 148 152
156 156 160 161 163 164 167 168 168 169 170 171 175 177
|
adam_txt |
WIRELESS COMMUNICATIONS SECURITY HIDEKI IMAI MOHAMMAD GHULAM RAHMAN
KAZUKUNI KOBARA ARTECH HOUSE BOSTON|LONDON ARTECHHOUSE.COM CONTENTS
PREFACE XI 1 2 2.1 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.3 2.4 2.5 2.5.1 2.5.2
2.5.3 2.5.4 2.5.5 INTRODUCTION CRYPTOGRAPHY INTRODUCTION BASIC CONCEPTS
CIPHERTEXT AND PLAINTEXT TYPES OF CRYPTOSYSTEMS GOALS OF A CRYPTOSYSTEM
SECURITY SYMMETRIC ENCRYPTION SCHEMES PERFECT SECRECY: THE ONE-TIME PAD
BLOCK CIPHERS PERMUTATION SUBSTITUTION DIFFUSION/CONFUSION SP NETWORKS
BASIC STRUCTURE 1 5 5 5 5 6 7 8 9 9 II 11 12 13 14 14 IFF 2.5.6 2.5.7
2.5.8 2.6 2.6.1 2.6.2 2.6.3 2.7 2.7.1 2.7.2 2.7.3 2.7.4 2.7.5 2.7.6
2.7.7 * 2.7.8 2.7.9 2.7.10 2.7.11 2.7.12 3 3.1 3.2 3.3 3.4 3.5 WIRELESS
COMMUNICATIONS SECURITY MODES OF USE DES AES STREAM CIPHERS ADVANTAGES
SECURITY REMARKS SOME EXAMPLES ASYMMETRIC CRYPTOSYSTEMS AND DIGITAL
SIGNATURES PUBLIC-KEY ENCRYPTION PUBLIC KEY INFRASTRUCTURE (PKI) AND
CERTIFICATE AUTHORITIES (CA) MATHEMATICAL BACKGROUND DIFFIE-HELLMAN KEY
AGREEMENT RSA CRYPTOSYSTEM ELGAMAL CRYPTOSYSTEM NECESSARY SECURITY FOR
PRACTICAL PUBLIC KEY ENCRYPTION SYSTEMS DIGITAL SIGNATURE MATHEMATICAL
BACKGROUND RSA SIGNATURE SCHEME DIGITAL SIGNATURE ALGORITHM (DSA)
NECESSARY SECURITY FOR PRACTICAL DIGITAL SIGNATURE SYSTEMS REFERENCES
SECURITY FEATURES IN WIRELESS ENVIRONMENT INTRODUCTION MOBILE NETWORK
ENVIRONMENT GENERAL SECURITY THREATS OF A NETWORK LIMITATIONS OF MOBILE
ENVIRONMENT MOBILITY AND SECURITY 15 17 18 19 20 20 21 21 22 23 25 27 28
29 31 32 33 35 36 36 38 41 41 42 44 45 46 CONTENTS VII 3.6 3.6.1 3.6.2
3.6.3 3.6.4 3.6.5 3.7 3.7.1 3.7.2 3.7.3 3.7.4 4 4.1 4.1.1 4.1.2 4.1.3
4.1.4 4.1.5 4.1.6 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.2.6 5 5.1 5.1.1
ATTACKS IN MOBILE ENVIRONMENT NUISANCE ATTACK IMPERSONATION ATTACK
INTERCEPTION ATTACK REPLAY ATTACK PARALLEL SESSION ATTACK SECURITY
ISSUES IN MOBILE ENVIRONMENT AUTHENTICATION ANONYMITY DEVICE
VULNERABILITY DOMAIN BOUNDARY CROSSING REFERENCES STANDARD PROTOCOLS
IEEE802.IL BRIEF HISTORY IEEE802.IL ARCHITECTURE IEEE802.1L LAYERS
SECURITY OF IEEE 802.11 KEY MANAGEMENT WEAKNESSES OF WEP BLUETOOTH
BLUETOOTH OVERVIEW BRIEF HISTORY BENEFITS BLUETOOTH ARCHITECTURE AND
COMPONENTS SECURITY OF BLUETOOTH PROBLEMS IN THE SECURITY OF BLUETOOTH
REFERENCE SECURITY IN 2G SYSTEMS GSM SYSTEM INTRODUCTION 46 47 48 48 48
48 49 49 50 52 52 53 55 55 55 56 60 62 69 70 72 72 73 74 76 78 89 90 91
92 92 VIII WIRELESS COMMUNICATIONS SECURITY 5.1.2 5.1.3 5.1.4 5.2 5.2.1
5.2.2 5.2.3 5.2.4 5.2.5 5.2.6 5.3 5.3.1 5.3.2 5.3.3 5.3.4 5.3.5 6 6.1
6.2 6.2.1 6.3 6.3.1 6,3.2 6.3.3 6.3.4 6.3.5 ARCHITECTURE OF THE GSM
NETWORK GSM SECURITY FEATURES ATTACKS ON GSM SECURITY I-MODE
INTRODUCTION INTRODUCTION I-MODE SYSTEM OVERVIEW SSL OVERVIEW PROTOCOL
STACK HTTP TUNNELING PROTOCOL POSTSCRIPT CDPD INTRODUCTION BASIC IDEA
BASIC INFRASTRUCTURE HOW A CDPD CONNECTION WORKS CDPD SECURITY
REFERENCES SECURITY IN 3G AND 4G SYSTEMS 3G WIRELESS COMMUNICATIONS
SYSTEMS THIRD GENERATION PARTNERSHIP PROJECT (3GPP) 3GPP SECURITY
OBJECTIVES 3G SECURITY ARCHITECTURE NETWORK ACCESS SECURITY NETWORK
DOMAIN SECURITY USER DOMAIN SECURITY PROVIDER-USER LINK SECURITY
VISIBILITY AND CONFIGURABILITY OF SECURITY 93 96 103 106 106 107 108 110
114 116 116 116 118 119 122 125 129 131 131 133 133 134 135 136 136 136
137 6.4 AUTHENTICATION AND KEY AGREEMENT (AKA) IN3GPP 137 6.5
CONFIDENTIALITY AND INTEGRITY 138 6.5.1 CONFIDENTIALITY 139 CONTENTS IX
6.5.2 6.6 7 7.1 7.2 7.3 7.3.1 7.3.2 7.4 7.4.1 7.4.2 7.4.3 7.5 7.5.1
7.5.2 7.5.3 7.5.4 1.6 7.7 DATA INTEGRITY 4G WIRELESS COMMUNICATIONS
SYSTEMS REFERENCES WIRELESS APPLICATION PROTOCOL (WAP) INTRODUCTION WAP
PROTOCOL STACK WAP PKI MODEL WTLS CLASS 2 WTLS CLASS 3 AND SIGNTEXT
CIPHER SUITE IN WTLS KEY EXCHANGE SUITE ELLIPTIC CURVE PARAMETERS IN
WTLS BULK ENCRYPTION AND MAC SUITE WAP-PROFILED TLS CIPHER SUITES
SESSION ID AND SESSION RESUME SERVER/CLIENT AUTHENTICATION AND
CERTIFICATE TLS TUNNELING WAP IDENTITY MODULE FURTHER INFORMATION
REFERENCES ABOUT THE AUTHORS INDEX 140 141 142 143 143 144 147 148 152
156 156 160 161 163 164 167 168 168 169 170 171 175 177 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Imai, Hideki 1943- Rahman, Mohammad Ghulam Kobara, Kazukuni |
author_GND | (DE-588)121605256 |
author_facet | Imai, Hideki 1943- Rahman, Mohammad Ghulam Kobara, Kazukuni |
author_role | aut aut aut |
author_sort | Imai, Hideki 1943- |
author_variant | h i hi m g r mg mgr k k kk |
building | Verbundindex |
bvnumber | BV022204092 |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 |
callnumber-search | TK5103.2 |
callnumber-sort | TK 45103.2 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
ctrlnum | (OCoLC)61451680 (DE-599)BVBBV022204092 |
dewey-full | 621.384 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.384 |
dewey-search | 621.384 |
dewey-sort | 3621.384 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01945nam a2200493zc 4500</leader><controlfield tag="001">BV022204092</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070103 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">061222s2006 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005053075</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580535208</subfield><subfield code="c">alk. paper</subfield><subfield code="9">1-58053-520-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61451680</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022204092</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.384</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Imai, Hideki</subfield><subfield code="d">1943-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121605256</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless communications security</subfield><subfield code="c">Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 179 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Universal personal communications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">WAP</subfield><subfield code="0">(DE-588)4596465-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">WAP</subfield><subfield code="0">(DE-588)4596465-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahman, Mohammad Ghulam</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kobara, Kazukuni</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015415508&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015415508</subfield></datafield></record></collection> |
id | DE-604.BV022204092 |
illustrated | Illustrated |
index_date | 2024-07-02T16:24:51Z |
indexdate | 2024-07-09T20:52:18Z |
institution | BVB |
isbn | 1580535208 |
language | English |
lccn | 2005053075 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015415508 |
oclc_num | 61451680 |
open_access_boolean | |
owner | DE-29T DE-634 |
owner_facet | DE-29T DE-634 |
physical | XI, 179 S. graph. Darst. 23 cm |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Artech House |
record_format | marc |
series2 | Universal personal communications |
spelling | Imai, Hideki 1943- Verfasser (DE-588)121605256 aut Wireless communications security Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara Boston [u.a.] Artech House 2006 XI, 179 S. graph. Darst. 23 cm txt rdacontent n rdamedia nc rdacarrier Universal personal communications Includes bibliographical references and index Wireless communication systems Security measures Mobile communication systems Security measures Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf WAP (DE-588)4596465-8 gnd rswk-swf Mobilfunk (DE-588)4170280-3 gnd rswk-swf Mobilfunk (DE-588)4170280-3 s Datensicherung (DE-588)4011144-1 s WAP (DE-588)4596465-8 s Kryptologie (DE-588)4033329-2 s DE-604 Rahman, Mohammad Ghulam Verfasser aut Kobara, Kazukuni Verfasser aut GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015415508&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Imai, Hideki 1943- Rahman, Mohammad Ghulam Kobara, Kazukuni Wireless communications security Wireless communication systems Security measures Mobile communication systems Security measures Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd WAP (DE-588)4596465-8 gnd Mobilfunk (DE-588)4170280-3 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4011144-1 (DE-588)4596465-8 (DE-588)4170280-3 |
title | Wireless communications security |
title_auth | Wireless communications security |
title_exact_search | Wireless communications security |
title_exact_search_txtP | Wireless communications security |
title_full | Wireless communications security Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara |
title_fullStr | Wireless communications security Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara |
title_full_unstemmed | Wireless communications security Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara |
title_short | Wireless communications security |
title_sort | wireless communications security |
topic | Wireless communication systems Security measures Mobile communication systems Security measures Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd WAP (DE-588)4596465-8 gnd Mobilfunk (DE-588)4170280-3 gnd |
topic_facet | Wireless communication systems Security measures Mobile communication systems Security measures Kryptologie Datensicherung WAP Mobilfunk |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015415508&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT imaihideki wirelesscommunicationssecurity AT rahmanmohammadghulam wirelesscommunicationssecurity AT kobarakazukuni wirelesscommunicationssecurity |