Wireless mobile internet security
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies wil...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Chichester, West Sussex, United Kingdom :
Wiley, A John Wiley & Sons Ltd., Publication
2013.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627904206719 |
Tabla de Contenidos:
- -- Preface xiii
- About the Author xxi
- Acknowledgments xxiii
- 1 Internetworking and Layered Models 1
- 1.1 Networking Technology 2
- 1.2 Connecting Devices 5
- 1.3 The OSI Model 8
- 1.4 TCP/IP Model 12
- 2 TCP/IP Suite and Internet Stack Protocols 15
- 2.1 Network Layer Protocols 15
- 2.2 Transport Layer Protocols 41
- 2.3 World Wide Web 47
- 2.4 File Transfer 49
- 2.5 E-Mail 50
- 2.6 Network Management Service 52
- 2.7 Converting IP Addresses 53
- 2.8 Routing Protocols 54
- 2.9 Remote System Programs 55
- 2.10 Social Networking Services 56
- 2.11 Smart IT Devices 57
- 2.12 Network Security Threats 58
- 2.13 Internet Security Threats 58
- 2.14 Computer Security Threats 59
- 3 Global Trend of Mobile Wireless Technology 63
- 3.1 1G Cellular Technology 63
- 3.2 2G Mobile Radio Technology 64
- 3.3 2.5G Mobile Radio Technology 67
- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70
- 3.5 3G UMTS Security-Related Encryption Algorithm 75
- 4 Symmetric Block Ciphers 81
- 4.1 Data Encryption Standard (DES) 81
- 4.2 International Data Encryption Algorithm (IDEA) 99
- 4.3 RC5 Algorithm 108
- 4.4 RC6 Algorithm 123
- 4.5 AES (Rijndael) Algorithm 135
- 5 Hash Function, Message Digest, and Message Authentication Code 161
- 5.1 DMDC Algorithm 161
- 5.2 Advanced DMDC Algorithm 171
- 5.3 MD5 Message-Digest Algorithm 176
- 5.4 Secure Hash Algorithm (SHA-1) 188
- 5.5 Hashed Message Authentication Codes (HMAC) 195
- 6 Asymmetric Public-Key Cryptosystems 203
- 6.1 Diffie / Hellman Exponential Key Exchange 203
- 6.2 RSA Public-Key Cryptosystem 207
- 6.3 ElGamal's Public-Key Cryptosystem 215
- 6.4 Schnorr's Public-Key Cryptosystem 222
- 6.5 Digital Signature Algorithm 227
- 6.6 The Elliptic Curve Cryptosystem (ECC) 230
- 7 Public-Key Infrastructure 249
- 7.1 Internet Publications for Standards 250
- 7.2 Digital Signing Techniques 251
- 7.3 Functional Roles of PKI Entities 258
- 7.4 Key Elements for PKI Operations 263
- 7.5 X.509 Certificate Formats 271.
- 7.6 Certificate Revocation List 282
- 7.7 Certification Path Validation 287
- 8 Network Layer Security 291
- 8.1 IPsec Protocol 291
- 8.2 IP Authentication Header 299
- 8.3 IP ESP 301
- 8.4 Key Management Protocol for IPsec 308
- 9 Transport Layer Security: SSLv3 and TLSv1 325
- 9.1 SSL Protocol 325
- 9.2 Cryptographic Computations 338
- 9.3 TLS Protocol 339
- 10 Electronic Mail Security: PGP, S/MIME 353
- 10.1 PGP 353
- 10.2 S/MIME 372
- 11 Internet Firewalls for Trusted Systems 387
- 11.1 Role of Firewalls 387
- 11.2 Firewall-Related Terminology 388
- 11.3 Types of Firewalls 392
- 11.4 Firewall Designs 398
- 11.5 IDS Against Cyber Attacks 401
- 11.6 Intrusion Detections Systems 404
- 12 SET for E-Commerce Transactions 415
- 12.1 Business Requirements for SET 415
- 12.2 SET System Participants 417
- 12.3 Cryptographic Operation Principles 418
- 12.4 Dual Signature and Signature Verification 420
- 12.5 Authentication and Message Integrity 424
- 12.6 Payment Processing 427
- 13 4G Wireless Internet Communication Technology 439
- 13.1 Mobile WiMAX 440
- 13.2 WiBro (Wireless Broadband) 448
- 13.3 UMB (Ultra Mobile Broadband) 452
- 13.4 LTE (Long Term Evolution) 457
- Acronyms 467
- Bibliography 473
- Index 481.