Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Έκδοση: | 1st ed. 2018. |
Σειρά: | Lecture Notes in Electrical Engineering,
447 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
- Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
- Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
- Hash-then-Encode: A Modular Semantically Secure Wiretap Code
- A CCA-Secure Cryptosystem Using Massive MIMO Channels
- You Are How You Play: Authenticating Mobile Users via Game Playing
- Fuzzy Authentication using Rank Distance
- A McEliece-based Key Exchange Protocol for Optical Communication Systems
- An ICN-based Authentication Protocol for a Simplified LTE Architecture.