Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Baldi, Marco (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Quaglia, Elizabeth A. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Tomasin, Stefano (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Lecture Notes in Electrical Engineering, 447
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
  • Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
  • Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
  • Hash-then-Encode: A Modular Semantically Secure Wiretap Code
  • A CCA-Secure Cryptosystem Using Massive MIMO Channels
  • You Are How You Play: Authenticating Mobile Users via Game Playing
  • Fuzzy Authentication using Rank Distance
  • A McEliece-based Key Exchange Protocol for Optical Communication Systems
  • An ICN-based Authentication Protocol for a Simplified LTE Architecture.