Marknadens största urval
Snabb leverans

Böcker av Geir M. Koien

Filter
Filter
Sortera efterSortera Populära
  • av Geir M. Koien
    699,-

    Aspects of Personal Privacy in Communications is mostly about understanding what privacy is and some of the technologies may help us to regain a bit of privacy. We discuss what privacy is about, what the different aspects of privacy may be and why privacy needs to be there by default.

  • - Problems, Technology and Solutions
    av Geir M. Koien
    1 235,-

    Examines what privacy is and some of the technologies that may help us to regain some privacy. The book discusses what privacy is about, what the different aspects of privacy may be and why privacy needs to be there by default. Technologies that are specifically designed to help us regain some digital privacy are discussed.

  • av Geir M. Koien
    1 365,-

    There are now (Q1 2009) more than 4 billion cellular subscribers in the world and this number is constantly growing. With this in mind it should be clear that use of mobile communication has already become both pervasive and ubiquitous. It has become a global commodity really. Entity Authentication and Personal Privacy in Future Cellular Systems aims at explaining and examining access security as it is found in mobile/cellular systems. A thorough investigation of how access security and personal privacy is handled in the 3GPP system is conducted. This includes both the 2G systems GSM/GPRS and the 3G system UMTS. The emerging fourth generation LTE architecture is also examined. The first part of the book deals exclusively with presenting access security as found in the 3GPP system. Particular attention is given to the authentication and key agreement procedures. The 3GPP systems have evolved and the access security architecture in LTE is substantially more advanced and mature than what you would find in GSM/GPRS, but even the LTE security architecture has its limitations. In part two of the book we go on to examine what is missing from the current cellular access security architectures. Some of the shortcomings found in GSM/GPRS and later UMTS have been partially addressed in LTE, but the burden of backwards compatibility has meant that many issues could not easily be resolved. Free from those restrictions, we shall see that one can provide substantially improved subscriber privacy and enhanced entity authentication, while also avoiding the delegated authentication control that all 3GPP systems have.The design of authentication protocols is discussed in depth, and this would also include looking into the role of formal verification in the design of security protocols.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.