Signal detection and estimation / Mourad Barkat.

By: Barkat, MouradSeries: Artech House radar libraryPublisher: Boston : Artech House, c2005Edition: 2nd edDescription: xvii, 692 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN: 1580530702Subject(s): Estimation theory | Radar | Stochastic processes | Telecommunication EngineeringDDC classification: 621.3822,BAR
Contents:
A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security (Page-301), Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Reference Reference Military College of Signals (MCS)
Military College of Signals (MCS)
Reference 621.3822,BAR (Browse shelf) Link to resource Not for loan Almirah No.22, Shelf No.3 MCS32474
Total holds: 0

A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security (Page-301), Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.