Mobile communication systems and security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Singapore
Wiley
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXXVI, 439 S. Ill., graph. Darst. |
ISBN: | 9780470823361 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035545094 | ||
003 | DE-604 | ||
005 | 20090618 | ||
007 | t | ||
008 | 090602s2009 si ad|| |||| 00||| eng d | ||
010 | |a 2008029106 | ||
020 | |a 9780470823361 |c cloth |9 978-0-470-82336-1 | ||
035 | |a (OCoLC)233591919 | ||
035 | |a (DE-599)BVBBV035545094 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a si |c SG | ||
049 | |a DE-20 |a DE-83 | ||
050 | 0 | |a TK5103.2 | |
082 | 0 | |a 621.38 | |
082 | 0 | |a 005.8 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ZN 6400 |0 (DE-625)157560: |2 rvk | ||
084 | |a ZN 6560 |0 (DE-625)157572: |2 rvk | ||
100 | 1 | |a Rhee, Man Young |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile communication systems and security |c Man Young Rhee |
264 | 1 | |a Singapore |b Wiley |c 2009 | |
300 | |a XXXVI, 439 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Mobile communication systems | |
650 | 4 | |a Wireless communication systems | |
650 | 4 | |a Mobile communication systems |x Security measures | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 0 | 7 | |a Mobile Telekommunikation |0 (DE-588)4341131-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobile Telekommunikation |0 (DE-588)4341131-9 |D s |
689 | 0 | 1 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017601085&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017601085 |
Datensatz im Suchindex
_version_ | 1804139186945523712 |
---|---|
adam_text | Titel: Mobile communication systems and security
Autor: Rhee, Man Young
Jahr: 2009
Contents
Preface xi
Acknowledgement xvii
About the Author xix
Abbreviations xxi
1 Global System for Mobile Communications 1
1.1 GSM Bandwidth Allocation 1
1.2 GSM System Architecture 2
1.2.1 Mobile Station (SIM + ME) 2
1.2.2 Base Station Subsystem (BSS) 3
1.2.3 Network SubSystem (NSS) 3
1.2.4 Operating SubSystem (OSS) 5
1.3 GSM Transmission Network Architecture 5
1.3.1 Message Management Layer (Layer 3) 5
1.3.2 Data Link Layer (Layer 2) 7
1.3.3 Physical Layer (Layer 1 ) 7
1.4 Signaling Channels on the Air Interface 8
1.4.1 Broadcast Channels (BCHs) 8
1.4.2 Common Control Channels (CCCHs) 8
1.4.3 Dedicated Control Channel (DCCH) 9
1.5 GSM Security Architecture 10
1.5.1 GSM Authentication 10
1.5.2 GSM Confidentiality 16
1.5.3 Multiple Encryption 20
1.5.4 Encryption by AES Rijndael Algorithm 24
2 cdmaOne IS-95A Technology 27
2.1 Reverse CDMA Channel 28
2.1.1 Reverse Traffic Channel 28
2.1.2 Access Channel 58
2.1.3 Multiplex Option 1 Information 64
2.1.4 Multiplex Option 2 Information 65
Contents
2.2 Forward CDMA Channel 65
2.2.1 Pilot Channel 68
2.2.2 Sync Channel 70
2.2.3 Paging Channel 78
2.2.4 Forward Traffic Channel 86
3 General Packet Radio Service (GPRS) 95
3.1 GPRS System Architecture 95
3.1.1 GPRS Network Support Nodes 96
3.1.2 Reference Points and Data Transfer Interfaces 96
3.1.3 Signaling Transfer Interfaces 97
3.1.4 GPRS-PLMN Backbone Networks 98
3.2 GPRS Logical Functions 99
3.2.1 Network Access Control 99
3.2.2 Packet Transfer and Routing 99
3.2.3 Mobility Management 100
3.2.4 State Models for Location Management 101
3.2.5 State Transitions of a Mobile Station 102
3.2.6 Packet Mobility Management (Iu Mode) 103
3.3 Layered Protocol Architecture of Transmission Plane 105
3.3.1 User Plane for A/Gb Mode 105
3.3.2 Control Plane for A/Gb Mode 107
3.3.3 Control Plane for Iu Mode 107
3.4 GPRS Ciphering Algorithm 108
3.4.1 Parameters for Algorithm Design 109
3.4.2 GPRS Encryption Algorithm 3 (GEA3) 110
3.4.3 Ciphering and Deciphering 111
4 Third-generation Partnership Projects (3GPP and 3GPP2) 119
4.1 3G Partnership Projects 120
4.2 Evolution of Mobile Radio Technologies 122
4.2.1 2G Mobile Radio Technologies 122
4.2.2 2.5G Mobile Radio Technologies 123
4.2.3 3G Mobile Radio Technologies (Situation and Status of 3G) 124
4.3 Cryptographic Protocols Applicable to Wireless Security Technologies 127
5 Universal Mobile Telecommunication System (UMTS) 133
5.1 UMTS Standardization 133
5.2 FDD/TDD Modes for UTRA Operation 134
5.3 UMTS Architecture 135
5.4 UTRAN Architecture 136
5.5 UTRAN Terrestrial Interface 137
5.5.1 Horizontal Layers 137
5.5.2 Vertical Planes 137
5.6 UTRAN-CN Interface via Iu 138
Contents vii
5.6.1 Iu CS Protocol Structure 139
5.6.2 Iu PS Protocol Structure 140
5.7 UMTS Security Related Features 142
5.7.1 KASUMI Encryption Function 142
5.7.2 User and Signaling Data Confidentiality 149
5.7.3 KGCORE (Core Keystream Generation Function) 152
5.7.4 Summary of Four Confidentiality Functions 153
5.7.5 Key Scheduling 153
5.8 UTRAN Overall Functions 162
5.9 UTRAN Iub Interface Protocol Structure 163
5.10 UTRAN Iur Interface Protocol Structure 165
6 High Speed Downlink Packet Access (HSDPA) 167
6.1 Basic Structure of HS-DSCH 167
6.1.1 Protocol Structure 167
6.1.2 HS-DSCH Physical Layer Model 169
6.2 Overview of HSDPA Enhancement Technologies 172
6.2.1 CQI Enhancement (FDD Mode) 172
6.2.2 Multiple Simultaneous Transmission to a UE Within
Sub-Frame 173
6.2.3 Code Reuse for Downlink HS-DSCH 173
6.2.4 Fast Signalling Between Node B and UE 173
6.2.5 Fast Adaptive Emphasis 174
6.2.6 ACK/NACK Transmit Power Reduction for HS-DPCCH 174
6.2.7 Fractional Dedicated Physical Channel (F-DPCH) 174
6.3 HS-DSCH MAC Architecture—UE Side 175
6.3.1 Overall Architecture 175
6.3.2 MAC-d Entity 176
6.3.3 MAC-c/sh Entity 177
6.3.4 MAC-hs Entity 177
6.3.5 MAC-ehs Entity 178
6.4 HS-DSCH MAC Architecture—UTRAN Side 180
6.4.1 Overall MAC Architecture 180
6.4.2 MAC-c/sh Entity 180
6.4.3 MAC-hs Entity 180
6.4.4 MAC-ehs Entity 182
6.5 Overview of HSDPA Techniques to Support UTRA 184
6.5.1 Adaptive Modulation and Coding (AMC) 184
6.5.2 Hybrid ARQ (HARQ) 185
6.5.3 Fast Cell Selection 186
6.5.4 Multiple Input Multiple Output Antenna Processing 187
6.5.5 Handling for Error Cases 189
6.6 Orthogonal Frequency Division Multiplexing (OFDM) 190
6.6.1 OFDM Modulation Scheme 190
6.6.2 Signal Processing Over OFDM Transceiver 194
6.7 Prospect of OFDM-based Applications 195
viii Contents
7 CDMA2000 Ix High Rate Packet Data System (lxEV-DO) 197
7.1 Architectural Reference Protocol Model 197
7.2 Air Interface Layering Protocol 200
7.2.1 Application Layer Protocols 200
7.2.2 Multi-Flow Packet Application 204
7.3 Stream Layer Protocol 206
7.3.1 Protocol Initialization 207
7.3.2 Procedures and Messages for the InConfiguration
and InUse Instances 208
7.4 Session Layer Protocol 208
7.4.1 Default Session Management Protocol (SMP) 209
7.4.2 Default Address Management Protocol (AMP) 210
7.4.3 Default Session Configuration Protocol 212
7.5 Connection Layer Protocol 213
7.5.1 Data Encapsulation for InUse Protocol Instance 214
7.5.2 Air-Link Management Protocol 214
7.5.3 Initialization State Protocol 215
7.5.4 Idle State Protocol 216
7.5.5 Connected State Protocol 216
7.5.6 Route Update Protocol 217
7.5.7 Packet Consolidation Protocol 218
7.5.8 Overhead Messages Protocol 220
7.6 Security Layer Protocols 220
7.6.1 Security Layer Encapsulation 220
7.6.2 Default Security Protocol 221
7.6.3 Diffie-Hellman Key Exchange Protocol 222
7.6.4 Access Terminal (AT) Requirements 223
7.6.5 Access Network (AN) Requirements 224
7.6.6 Authentication Key and Encryption Key
Generation 229
7.7 MAC Layer Protocols 234
7.7.1 Data Encapsulation for the MAC Protocols 234
7.7.2 Control Channel MAC Protocol 234
7.7.3 Procedures and Messages for the InUse Instance 237
7.7.4 Control Channel Capsules 237
7.7.5 Access Channel MAC Protocol 239
7.7.6 Forward Traffic Channel MAC Protocol 243
7.7.7 Reverse Traffic Channel MAC Protocol 247
7.8 Physical Layer Protocol 251
7.8.1 Subtype 0 (Default) and Subtype 1 Physical
Layer Protocol 251
7.8.2 Frame Check Sequence (FCS) Computation 252
7.8.3 Role of Access Terminal 254
7.8.4 Access Network Requirements 269
Contents ix
8 CDMA2000 Ix Evolution-Data and Voice (lxEV-DV) 287
8.1 UMTS (WCDMA) Versus CDMA2000—Physical Layer Harmonization 288
8.2 Reverse CDMA Channel 288
8.2.1 Reverse Pilot Channel (R-PICH) 288
8.2.2 Reverse Secondary Pilot Channel (R-SPICH) 290
8.2.3 Access Channel 291
8.2.4 Enhanced Access Channel (R-EACH) 291
8.2.5 Reverse Common Control Channel (R-CCCH) 293
8.2.6 Reserve Packet Data Control Channel (R-PDCCH) 294
8.2.7 Reverse Request Channel (R-REQCH) 295
8.2.8 Reverse Dedicated Control Channel (R-DCCH) 296
8.2.9 Reverse Acknowledgment Channel (R-ACKCH) 298
8.2.10 Reverse Channel Quality Indicator Channel (R-CQICH) 298
8.2.11 Reverse Fundamental Channel (R-FCH) 299
8.2.12 Reverse Supplemental Channel (R-SCH) 301
8.2.13 Reverse Supplemental Code Channel (R-SCCH) 303
8.2.14 Reverse Packet Data Channel (R-PDCH) 303
8.3 Forward CDMA Channel 306
8.3.1 Pilot Channels 309
8.3.2 Sync Channel (F-SYNCH) 311
8.3.3 Paging Channel (F-PCH) 312
8.3.4 Quick Paging Channel (F-QPCH) 312
8.3.5 Broadcast Control Channel (F-BCCH) 313
8.3.6 Common Assignment Channel (F-CACH) 313
8.3.7 Forward Common Control Channel (F-CCCH) 315
8.3.8 Forward Indicator Control Channel (F-ICCH) 316
8.3.9 Forward Grant Channel (F-GCH) 320
8.3.10 Forward Acknowledgment Channel (F-ACKCH) 321
8.3.11 Forward Packet Data Control Channel (F-PDCCH) 323
8.3.12 Forward Dedicated Control Channel (F-DCCH) 325
8.3.13 Forward Fundamental Channel (F-FCH) 326
8.3.14 Forward Supplemental Channel (F-SCH) 329
8.3.15 Forward Supplemental Code Channel (F-SCCH) 330
8.3.16 Forward Packet Data Channel (F-PDCH) 332
8.4 CDMA2000 Entities and Service Interfaces 332
8.4.1 CDMA2000 lx EV-DV Service Interface Structure
(Mobile Station) 332
9 Advanced Encryption Standard and Elliptic Curve Cryptosystems 341
9.1 Advanced Encryption Standard (AES) 342
9.1.1 Notational Conventions 342
9.1.2 Mathematical Operations 344
9.1.3 AES Algorithm Specification 347
9.1.4 Key Expansion 347
9.1.5 AES Cipher 349
9.1.6 AES Inverse Cipher 354
x Contents
9.2 Elliptic Curve Cryptosystem (ECC) 357
9.2.1 Elliptic Curves 357
9.2.2 Elliptic Curves Over Prime Field Zp 357
9.2.3 Elliptic Curve Over Finite Galois Field GF(2m) 364
9.3 Elliptic Curve Cryptosystem versus Public-Key Cryptosystems 366
9.3.1 Diffie-Hellman Key Exchange 366
9.3.2 Elliptic Curve Diffie-Hellman Key Exchange 367
9.3.3 RSA Signature Algorithm 371
9.3.4 Elliptic Curve RSA Signature Algorithm 372
9.3.5 ElGamal Public-Key Encryption 374
9.3.6 Elliptic Curve ElGamal Encryption 375
9.3.7 Schnorr s Authentication Algorithm 379
9.3.8 EC Schnorr s Authentication Protocol 380
9.3.9 Public-Key Digital Signature Algorithm 381
9.3.10 Elliptic Curve Digital Signature Algorithm 382
10 Hash Function, Message Authentication Code, and Data Expansion Function 387
10.1 MD5 Message-Digest Algorithm 387
10.1.1 Append Padding Bits 387
10.1.2 Append Length 388
10.1.3 Initialize MD Buffer 388
10.1.4 Define Four Auxiliary Functions (F, G, H, I) 388
10.1.5 FF, GG, HH, and II Transformations for Rounds 1, 2, 3, and 4 389
10.1.6 Computation of Four Rounds (64 Steps) 390
10.2 Secure Hash Algorithm (SHA-1) 400
10.2.1 Message Padding 400
10.2.2 Initialize 160-Bit Buffer 400
10.2.3 Functions Used 401
10.2.4 Constants Used 401
10.2.5 Computing the Message Digest 402
10.3 Hashed Message Authentication Codes (HMAC) 406
10.3.1 HMAC Structure 406
10.3.2 HMAC Computation Using RFC Method 406
10.3.3 HMAC Computation (Alternative Method) 409
10.4 Data Expansion Function 412
Bibliography 417
Index 421
|
any_adam_object | 1 |
author | Rhee, Man Young |
author_facet | Rhee, Man Young |
author_role | aut |
author_sort | Rhee, Man Young |
author_variant | m y r my myr |
building | Verbundindex |
bvnumber | BV035545094 |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 |
callnumber-search | TK5103.2 |
callnumber-sort | TK 45103.2 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ZN 6400 ZN 6560 |
ctrlnum | (OCoLC)233591919 (DE-599)BVBBV035545094 |
dewey-full | 621.38 005.8 |
dewey-hundreds | 600 - Technology (Applied sciences) 000 - Computer science, information, general works |
dewey-ones | 621 - Applied physics 005 - Computer programming, programs, data, security |
dewey-raw | 621.38 005.8 |
dewey-search | 621.38 005.8 |
dewey-sort | 3621.38 |
dewey-tens | 620 - Engineering and allied operations 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01927nam a2200505zc 4500</leader><controlfield tag="001">BV035545094</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090618 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090602s2009 si ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008029106</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470823361</subfield><subfield code="c">cloth</subfield><subfield code="9">978-0-470-82336-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)233591919</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035545094</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">si</subfield><subfield code="c">SG</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.38</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6400</subfield><subfield code="0">(DE-625)157560:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6560</subfield><subfield code="0">(DE-625)157572:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rhee, Man Young</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile communication systems and security</subfield><subfield code="c">Man Young Rhee</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXVI, 439 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017601085&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017601085</subfield></datafield></record></collection> |
id | DE-604.BV035545094 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:40:05Z |
institution | BVB |
isbn | 9780470823361 |
language | English |
lccn | 2008029106 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017601085 |
oclc_num | 233591919 |
open_access_boolean | |
owner | DE-20 DE-83 |
owner_facet | DE-20 DE-83 |
physical | XXXVI, 439 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Rhee, Man Young Verfasser aut Mobile communication systems and security Man Young Rhee Singapore Wiley 2009 XXXVI, 439 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Mobile communication systems Wireless communication systems Mobile communication systems Security measures Wireless communication systems Security measures Mobile Telekommunikation (DE-588)4341131-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf Mobile Telekommunikation (DE-588)4341131-9 s Mobile Computing (DE-588)4694120-4 s Computersicherheit (DE-588)4274324-2 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017601085&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Rhee, Man Young Mobile communication systems and security Mobile communication systems Wireless communication systems Mobile communication systems Security measures Wireless communication systems Security measures Mobile Telekommunikation (DE-588)4341131-9 gnd Computersicherheit (DE-588)4274324-2 gnd Mobile Computing (DE-588)4694120-4 gnd |
subject_GND | (DE-588)4341131-9 (DE-588)4274324-2 (DE-588)4694120-4 |
title | Mobile communication systems and security |
title_auth | Mobile communication systems and security |
title_exact_search | Mobile communication systems and security |
title_full | Mobile communication systems and security Man Young Rhee |
title_fullStr | Mobile communication systems and security Man Young Rhee |
title_full_unstemmed | Mobile communication systems and security Man Young Rhee |
title_short | Mobile communication systems and security |
title_sort | mobile communication systems and security |
topic | Mobile communication systems Wireless communication systems Mobile communication systems Security measures Wireless communication systems Security measures Mobile Telekommunikation (DE-588)4341131-9 gnd Computersicherheit (DE-588)4274324-2 gnd Mobile Computing (DE-588)4694120-4 gnd |
topic_facet | Mobile communication systems Wireless communication systems Mobile communication systems Security measures Wireless communication systems Security measures Mobile Telekommunikation Computersicherheit Mobile Computing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017601085&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT rheemanyoung mobilecommunicationsystemsandsecurity |