Global System for Mobile Communications | |
GSM Bandwidth Allocation | |
GSM System Architecture | |
GSM Transmission Network Architecture | |
Signalling Channels on the Air Interface | |
GSM Security Architecture | |
cdma One IS-95A Technology | |
Reverse CDMA Channel | |
Reverse Traffic Channel | |
Access Channel | |
Multiplex Option 1 Information | |
Multiplex Option 2 Information | |
Forward CDMA Channel | |
Pilot Channel | |
Sync Channel | |
Paging Channel | |
Forward Traffic Channel | |
General Packet Radio Service (GPRS) | |
GPRS System Architecture | |
GPRS Logical Functions | |
Layered Protocol Architecture of Transmission Plane | |
GPRS Ciphering Algorithm | |
Third Generation Partnership Projects | |
3G Partnership Projects | |
Evolution of Mobile Radio Technologies | |
Cryptographic Protocols Applicable to Wireless Security Technologies | |
Universal Mobile Telecommunication System | |
UMTS Standardization | |
FDD/TDD modes for UTRA Operation | |
UMTS Architecture | |
UTRAN Architecture | |
UTRAN Terrestrial Interface | |
UTRAN-CN Interface via Iu | |
UMTS Security Related Features | |
UTRAN Overall Functions | |
UTRAN Iub Interface Protocol Structure | |
High Speed Downlink Packet Access (HSDPA) | |
Basic Structure of HS-DSCH | |
Overview of HSDPA Enhancement Technologies | |
HS-DSCH MAC Architecture - UE side | |
HS-DSCH MAC Architecture-UTRAN side | |
Overview of HSDPA Techniques to Support UTRA | |
Orthogonal Frequency Division Multiplexing (OFDM) | |
Prospect of OFDM-based Applications | |
CDMA 2000 1x High Rate Packet Data System (1xEV-DO) | |
Architectural Reference Protocol Model | |
Air Interface Layering Protocol | |
Stream Layer Protocol | |
Session Layer Protocol | |
Connection Layer Protocol | |
Security Layer Protocols | |
MAC Layer Protocols | |
Physical Layer Protocol | |
CDMA2000 1x Evolution-Data and Voice (1x EV-DV) | |
UMTS (WCDMA) versus CDMA2000 - Physical Layer Harmonization | |
Reverse CDMA Channel | |
Forward CDMA Channel | |
CDMA 2000 Entities and Service Interfaces | |
Advanced Encryption Standard and Elliptic Curve Cryptosystems | |
Advanced Encryption Standard (AES) | |
Elliptic Curve Cryptosystem (ECC) | |
Elliptic Curve Cryptosystem versus Public-key Cryptosystems | |
Hash Function, Message Authentication Code and Data Expansion Function | |
MD5 Message-Digest Algorithm | |
Secure Hash Algorithm (SHA-1) | |
Hashed Message Authentication Codes (HMAC) | |
Data Expansion Function | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.