Lte security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley
2014
|
Schriftenreihe: | NSN/Nokia Series
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Beschreibung: | A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for Sae/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies only inform about how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a small group of experts and lack the context of the broader picture. The book fills this gap by providing first hand information from insiders who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP, and can therefore explain the rationale for design decisions in this area. -A concise, fully updated guide to the 3GPP LTE Security Standardization specifications -Describes the essential elements of LTE and Sae Security, written by leading experts who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP -Explains the rationale behind the standards specifications giving readers a broader understanding of the context to these specifications -Includes new chapters covering 3GPP work on system enhancements for MTC, plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP; Security for Machine-type Communication, Relay Node Security, and Future Challenges, including Voice over LTE, MTC, Home base stations, LIPA/SIPTO, and New Cryptographic Algorithms Essential reading for System engineers, developers and people in technical sales working in the area of LTE and LTE security, communication engineers and software developers in mobile communication field |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781118380659 1118380657 9780470973271 0470973277 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043396599 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118380659 |c electronic bk. |9 978-1-118-38065-9 | ||
020 | |a 1118380657 |c electronic bk. |9 1-118-38065-7 | ||
020 | |a 9780470973271 |c electronic bk. |9 978-0-470-97327-1 | ||
020 | |a 0470973277 |c electronic bk. |9 0-470-97327-7 | ||
024 | 7 | |a 10.1002/9780470973271 |2 doi | |
035 | |a (ZDB-35-WIC)ocn872647190 | ||
035 | |a (OCoLC)872647190 | ||
035 | |a (DE-599)BVBBV043396599 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 621.38456 | |
100 | 1 | |a Forsberg, Dan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Lte security |c Dan Forsberg, Gunther Horn, Valtteri Niemi and Wolf-Dietrich Moeller |
264 | 1 | |a Hoboken, N.J. |b Wiley |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NSN/Nokia Series | |
500 | |a A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for Sae/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies only inform about how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a small group of experts and lack the context of the broader picture. | ||
500 | |a The book fills this gap by providing first hand information from insiders who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP, and can therefore explain the rationale for design decisions in this area. | ||
500 | |a -A concise, fully updated guide to the 3GPP LTE Security Standardization specifications -Describes the essential elements of LTE and Sae Security, written by leading experts who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP -Explains the rationale behind the standards specifications giving readers a broader understanding of the context to these specifications -Includes new chapters covering 3GPP work on system enhancements for MTC, plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP; Security for Machine-type Communication, Relay Node Security, and Future Challenges, including Voice over LTE, MTC, Home base stations, LIPA/SIPTO, and New Cryptographic Algorithms Essential reading for System engineers, developers and people in technical sales working in the area of LTE and LTE security, communication engineers and software developers in mobile communication field | ||
630 | 0 | 7 | |a Long Term Evolution |0 (DE-588)7739053-2 |2 gnd |9 rswk-swf |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Telecommunications |2 bisacsh | |
650 | 7 | |a Technology |2 fast | |
650 | 4 | |a Global system for mobile communications | |
650 | 4 | |a Long-Term Evolution (Telecommunications) | |
650 | 4 | |a Technology | |
650 | 0 | 7 | |a Mobilfunk |0 (DE-588)4170280-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Mobilfunk |0 (DE-588)4170280-3 |D s |
689 | 0 | 1 | |a Long Term Evolution |0 (DE-588)7739053-2 |D u |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Moeller, Wolf-Dietrich |e Sonstige |4 oth | |
700 | 1 | |a Niemi, Valtteri |e Sonstige |4 oth | |
700 | 1 | |a Horn, Gunther |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028815183 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175977785327616 |
---|---|
any_adam_object | |
author | Forsberg, Dan |
author_facet | Forsberg, Dan |
author_role | aut |
author_sort | Forsberg, Dan |
author_variant | d f df |
building | Verbundindex |
bvnumber | BV043396599 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn872647190 (OCoLC)872647190 (DE-599)BVBBV043396599 |
dewey-full | 621.38456 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.38456 |
dewey-search | 621.38456 |
dewey-sort | 3621.38456 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04542nmm a2200637zc 4500</leader><controlfield tag="001">BV043396599</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118380659</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-38065-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118380657</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-38065-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470973271</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-97327-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470973277</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-97327-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9780470973271</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn872647190</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)872647190</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043396599</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.38456</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Forsberg, Dan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Lte security</subfield><subfield code="c">Dan Forsberg, Gunther Horn, Valtteri Niemi and Wolf-Dietrich Moeller</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NSN/Nokia Series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for Sae/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies only inform about how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a small group of experts and lack the context of the broader picture. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The book fills this gap by providing first hand information from insiders who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP, and can therefore explain the rationale for design decisions in this area. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">-A concise, fully updated guide to the 3GPP LTE Security Standardization specifications -Describes the essential elements of LTE and Sae Security, written by leading experts who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP -Explains the rationale behind the standards specifications giving readers a broader understanding of the context to these specifications -Includes new chapters covering 3GPP work on system enhancements for MTC, plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP; Security for Machine-type Communication, Relay Node Security, and Future Challenges, including Voice over LTE, MTC, Home base stations, LIPA/SIPTO, and New Cryptographic Algorithms Essential reading for System engineers, developers and people in technical sales working in the area of LTE and LTE security, communication engineers and software developers in mobile communication field</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Long Term Evolution</subfield><subfield code="0">(DE-588)7739053-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Telecommunications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Global system for mobile communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Long-Term Evolution (Telecommunications)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Long Term Evolution</subfield><subfield code="0">(DE-588)7739053-2</subfield><subfield code="D">u</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moeller, Wolf-Dietrich</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Niemi, Valtteri</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Horn, Gunther</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028815183</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043396599 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:52Z |
institution | BVB |
isbn | 9781118380659 1118380657 9780470973271 0470973277 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028815183 |
oclc_num | 872647190 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
series2 | NSN/Nokia Series |
spelling | Forsberg, Dan Verfasser aut Lte security Dan Forsberg, Gunther Horn, Valtteri Niemi and Wolf-Dietrich Moeller Hoboken, N.J. Wiley 2014 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier NSN/Nokia Series A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for Sae/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies only inform about how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a small group of experts and lack the context of the broader picture. The book fills this gap by providing first hand information from insiders who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP, and can therefore explain the rationale for design decisions in this area. -A concise, fully updated guide to the 3GPP LTE Security Standardization specifications -Describes the essential elements of LTE and Sae Security, written by leading experts who participated in decisively shaping Sae/LTE security in the relevant standardization body, 3GPP -Explains the rationale behind the standards specifications giving readers a broader understanding of the context to these specifications -Includes new chapters covering 3GPP work on system enhancements for MTC, plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP; Security for Machine-type Communication, Relay Node Security, and Future Challenges, including Voice over LTE, MTC, Home base stations, LIPA/SIPTO, and New Cryptographic Algorithms Essential reading for System engineers, developers and people in technical sales working in the area of LTE and LTE security, communication engineers and software developers in mobile communication field Long Term Evolution (DE-588)7739053-2 gnd rswk-swf TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Technology fast Global system for mobile communications Long-Term Evolution (Telecommunications) Technology Mobilfunk (DE-588)4170280-3 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Electronic books Mobilfunk (DE-588)4170280-3 s Long Term Evolution (DE-588)7739053-2 u Sicherheit (DE-588)4054790-5 s 1\p DE-604 Moeller, Wolf-Dietrich Sonstige oth Niemi, Valtteri Sonstige oth Horn, Gunther Sonstige oth https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Forsberg, Dan Lte security Long Term Evolution (DE-588)7739053-2 gnd TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Technology fast Global system for mobile communications Long-Term Evolution (Telecommunications) Technology Mobilfunk (DE-588)4170280-3 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)7739053-2 (DE-588)4170280-3 (DE-588)4054790-5 |
title | Lte security |
title_auth | Lte security |
title_exact_search | Lte security |
title_full | Lte security Dan Forsberg, Gunther Horn, Valtteri Niemi and Wolf-Dietrich Moeller |
title_fullStr | Lte security Dan Forsberg, Gunther Horn, Valtteri Niemi and Wolf-Dietrich Moeller |
title_full_unstemmed | Lte security Dan Forsberg, Gunther Horn, Valtteri Niemi and Wolf-Dietrich Moeller |
title_short | Lte security |
title_sort | lte security |
topic | Long Term Evolution (DE-588)7739053-2 gnd TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Technology fast Global system for mobile communications Long-Term Evolution (Telecommunications) Technology Mobilfunk (DE-588)4170280-3 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Long Term Evolution TECHNOLOGY & ENGINEERING / Telecommunications Technology Global system for mobile communications Long-Term Evolution (Telecommunications) Mobilfunk Sicherheit |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9780470973271 |
work_keys_str_mv | AT forsbergdan ltesecurity AT moellerwolfdietrich ltesecurity AT niemivaltteri ltesecurity AT horngunther ltesecurity |