000 02048 a2200253 4500
003 Nust
005 20220817112733.0
010 _a 2005048031
020 _a1580530702
040 _cNust
082 0 0 _a621.3822,BAR
100 1 _aBarkat, Mourad.
_962143
245 1 0 _aSignal detection and estimation /
_cMourad Barkat.
250 _a2nd ed.
260 _aBoston :
_bArtech House,
_cc2005.
300 _axvii, 692 p. :
_bill. ;
_c24 cm. +
_e1 CD-ROM (4 3/4 in.)
440 0 _aArtech House radar library
_928729
505 _aA protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security (Page-301), Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).
650 0 _aEstimation theory.
_910694
650 0 _aRadar.
650 0 _aStochastic processes.
650 0 _aTelecommunication Engineering
942 _2ddc
_cREF
999 _c175732
_d175732