Get Free Shipping on orders over $79
Communication System Security : Chapman & Hall/CRC Cryptography and Network Security Series - Lidong Chen

Communication System Security

By: Lidong Chen, Guang Gong

Hardcover | 29 May 2012 | Edition Number 1

At a Glance

Hardcover


RRP $420.00

$359.75

14%OFF

or 4 interest-free payments of $89.94 with

 or 

Ships in 3 to 5 business days

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.

Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms.

The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions.

Taking an evolutionary approach to security in today's telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios.

Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks.

With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis.

Industry Reviews

"For mathematicians, both students and researchers, the book gives comprehensive information about practical aspects of cryptography. ... Each chapter is supplied with an appropriate number of exercises. They are well chosen to demonstrate and clarify the considered topics. A rich (but not excessively large) bibliography is given at the end of each chapter. This organization of the book is quite handy for the reader."
-Nikolai L. Manev, Zentralblatt MATH 1263

More in Operating Systems

Troubleshooting PCs For Dummies : For Dummies (Computer/Tech) - Dan Gookin
Microsoft Power BI Step by Step - Jose Escalante
Principles of Operating Systems - Kate Summers
Windows 11 For Dummies, 2nd Edition : Windows 11 For Dummies - Alan Simpson
Linux All-In-One For Dummies : For Dummies (Computer/Tech) - Richard Blum
UNIX and Linux System Administration Handbook : 5th Edition - Ben Whaley
iPad and iPad Pro For Dummies - Paul McFedries

RRP $52.95

$40.75

23%
OFF
Git : Pocket Guide : A Working Introduction - Richard Silverman

RRP $47.75

$26.75

44%
OFF
Theory of Fun for Game Design - Raph Koster

RRP $85.75

$43.75

49%
OFF
MacBook For Dummies : Macbook for Dummies - Mark L. Chambers

RRP $49.95

$34.97

30%
OFF
Windows 11 All-in-One For Dummies, 2nd Edition : For Dummies - Ciprian Adrian Rusen
Linux Pocket Guide : 4th Edition - Essential Commands - Daniel J. Barrett