Coverart for item
The Resource Security in next generation mobile networks : SAE/LTE and WiMAX, Anand R. Prasad ; Seung-Woo Seo

Security in next generation mobile networks : SAE/LTE and WiMAX, Anand R. Prasad ; Seung-Woo Seo

Label
Security in next generation mobile networks : SAE/LTE and WiMAX
Title
Security in next generation mobile networks
Title remainder
SAE/LTE and WiMAX
Statement of responsibility
Anand R. Prasad ; Seung-Woo Seo
Creator
Contributor
Author
Subject
Language
eng
Member of
Cataloging source
E7B
http://library.link/vocab/creatorName
Prasad, Anand R
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
TK5102.85
LC item number
.P737 2011eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Sŏ, Sŭng-u
Series statement
River Publishers Series in Standardisation
Series volume
Volume 4
http://library.link/vocab/subjectName
  • Mobile communication systems
  • Wireless communication systems
  • Long-Term Evolution (Telecommunications)
  • Long-Term Evolution (Telecommunications)
  • Wireless communication systems
Label
Security in next generation mobile networks : SAE/LTE and WiMAX, Anand R. Prasad ; Seung-Woo Seo
Instantiates
Publication
Copyright
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Cover; Contents; Dedication; About the Authors; Preface; 1 Introduction; 1.1 NGMN; 1.1.1 Overview; 1.1.2 Security Requirements; 1.2 Book Overview; References; 2 Security Overview; 2.1 Objectives of Information Security; 2.1.1 Confidentiality; 2.1.2 Integrity; 2.1.3 Availability; 2.2 Types of Security Attacks; 2.2.1 Types of Attacks on Networks; 2.2.2 Security on Networks; 2.3 Basic Security Functions; 2.3.1 Authentication and Authorization; 2.3.2 Message Encryption; 2.3.3 Digital Signature; 2.3.4 Nonrepudiation; 2.3.5 Privacy Guarantee; 2.4 Cryptographic Primitives
  • 2.4.1 Symmetric-Key Cryptography Algorithm2.4.2 Hash Function and MAC; 2.4.3 Public-Key Cryptography Algorithm; 2.4.4 Random Number Generator; 2.4.5 Key Management; 2.4.6 Cryptographic Protocol; 2.4.7 Comments; 2.5 Extensible Authentication Protocol; 2.5.1 General EAP Architecture; 2.5.2 EAP Authentication Methods; 2.6 AAA Protocols; 2.6.1 RADIUS; 2.6.2 Diameter; 2.7 Conclusion; References; 3 Standardization; 3.1 3GPP; 3.1.1 Organization; 3.1.2 Standardization Process; 3.1.3 Evolution: 3GPP Network and Security; 3.2 IEEE 802.16 and WiMAX; 3.2.1 IEEE 802.16 Standards; 3.2.2 WiMAX Forum®
  • 3.2.3 WiMAX Technology Evolution3.2.4 Security Overview in WiMAX; References; 4 System Architecture and Long-Term Evolution Security; 4.1 Chapter Overview; 4.2 EPS System Overview; 4.2.1 Network Elements and Security Functions; 4.2.2 Protocol Layers and Security Functions; 4.3 Network Attachment; 4.4 Tracking Area; 4.5 Mobility; 4.6 Idle State Signaling Reduction; 4.7 EPS Identities; 4.8 Security Requirements; 4.9 Basic Points; 4.9.1 Key Hierarchy and Key Lifetime; 4.9.2 Security Contexts; 4.9.3 NAS Counts and Handling; 4.9.4 Cryptographic Algorithms and Usage Overview
  • 4.10 Authentication and Key Agreement (AKA)4.10.1 Basic Requirements; 4.10.2 Authentication Decision and Context Retrieval; 4.10.3 Authentication Procedure; 4.11 Algorithm Negotiation and Security Activation; 4.11.1 Algorithm Negotiation Requirements; 4.11.2 Non-access Stratum; 4.11.3 Access Stratum; 4.12 Key Handling at State Change; 4.13 Handover Key Handling; 4.14 Key Change On-The-Fly; 4.15 Connection Reestablishment: Token; 4.16 Local Authentication; 4.17 Inter-System Mobility; 4.17.1 Idle-Mode Mobility; 4.17.2 Handover; 4.18 Voice Call Continuity; 4.19 Emergency Call Security
Control code
878145269
Dimensions
unknown
Extent
1 online resource (242 pages)
Form of item
online
Isbn
9788792982865
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)878145269
Label
Security in next generation mobile networks : SAE/LTE and WiMAX, Anand R. Prasad ; Seung-Woo Seo
Publication
Copyright
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Cover; Contents; Dedication; About the Authors; Preface; 1 Introduction; 1.1 NGMN; 1.1.1 Overview; 1.1.2 Security Requirements; 1.2 Book Overview; References; 2 Security Overview; 2.1 Objectives of Information Security; 2.1.1 Confidentiality; 2.1.2 Integrity; 2.1.3 Availability; 2.2 Types of Security Attacks; 2.2.1 Types of Attacks on Networks; 2.2.2 Security on Networks; 2.3 Basic Security Functions; 2.3.1 Authentication and Authorization; 2.3.2 Message Encryption; 2.3.3 Digital Signature; 2.3.4 Nonrepudiation; 2.3.5 Privacy Guarantee; 2.4 Cryptographic Primitives
  • 2.4.1 Symmetric-Key Cryptography Algorithm2.4.2 Hash Function and MAC; 2.4.3 Public-Key Cryptography Algorithm; 2.4.4 Random Number Generator; 2.4.5 Key Management; 2.4.6 Cryptographic Protocol; 2.4.7 Comments; 2.5 Extensible Authentication Protocol; 2.5.1 General EAP Architecture; 2.5.2 EAP Authentication Methods; 2.6 AAA Protocols; 2.6.1 RADIUS; 2.6.2 Diameter; 2.7 Conclusion; References; 3 Standardization; 3.1 3GPP; 3.1.1 Organization; 3.1.2 Standardization Process; 3.1.3 Evolution: 3GPP Network and Security; 3.2 IEEE 802.16 and WiMAX; 3.2.1 IEEE 802.16 Standards; 3.2.2 WiMAX Forum®
  • 3.2.3 WiMAX Technology Evolution3.2.4 Security Overview in WiMAX; References; 4 System Architecture and Long-Term Evolution Security; 4.1 Chapter Overview; 4.2 EPS System Overview; 4.2.1 Network Elements and Security Functions; 4.2.2 Protocol Layers and Security Functions; 4.3 Network Attachment; 4.4 Tracking Area; 4.5 Mobility; 4.6 Idle State Signaling Reduction; 4.7 EPS Identities; 4.8 Security Requirements; 4.9 Basic Points; 4.9.1 Key Hierarchy and Key Lifetime; 4.9.2 Security Contexts; 4.9.3 NAS Counts and Handling; 4.9.4 Cryptographic Algorithms and Usage Overview
  • 4.10 Authentication and Key Agreement (AKA)4.10.1 Basic Requirements; 4.10.2 Authentication Decision and Context Retrieval; 4.10.3 Authentication Procedure; 4.11 Algorithm Negotiation and Security Activation; 4.11.1 Algorithm Negotiation Requirements; 4.11.2 Non-access Stratum; 4.11.3 Access Stratum; 4.12 Key Handling at State Change; 4.13 Handover Key Handling; 4.14 Key Change On-The-Fly; 4.15 Connection Reestablishment: Token; 4.16 Local Authentication; 4.17 Inter-System Mobility; 4.17.1 Idle-Mode Mobility; 4.17.2 Handover; 4.18 Voice Call Continuity; 4.19 Emergency Call Security
Control code
878145269
Dimensions
unknown
Extent
1 online resource (242 pages)
Form of item
online
Isbn
9788792982865
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)878145269

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...