EUR 13,75
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
EUR 11,59
Autre deviseQuantité disponible : 10 disponible(s)
Ajouter au panierPF. Etat : New.
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
EUR 18,18
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
EUR 16,07
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
EUR 16,86
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526.
Vendeur : moluna, Greven, Allemagne
EUR 21,51
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextThere is a plethora of books available on 3G mobile technology in its entirety, but when it comes to the actual mechanics of the cryptographic algorithms involved the information is typically vague. If your interest is in the.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 21,09
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - There is a plethora of books available on 3G mobile technology in its entirety, but when it comes to the actual mechanics of the cryptographic algorithms involved the information is typically vague. If your interest is in the precise workings of 3G cryptography then this book is for you; it is perhaps the only book of its kind.Every single original algorithm of 3G User Equipment (3G mobile phones) is explained in explicit detail, and each is coupled with a thorough example. The algorithms include the standardised functions, UEA1 for confidentiality and UIA1 for integrity, along with Kasumi, the corresponding kernel algorithm, and also all the non-standardised algorithms for authentication and key agreement, along with their corresponding kernel algorithm, Rijndael (A.E.S.).Contained here is all the information required to literally pencil-and-paper all the cryptographic inputs to outputs of 3G mobiles.patience not included!