Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Edition: | 1st ed. 2018. |
Series: | Lecture Notes in Electrical Engineering,
447 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
- Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
- Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
- Hash-then-Encode: A Modular Semantically Secure Wiretap Code
- A CCA-Secure Cryptosystem Using Massive MIMO Channels
- You Are How You Play: Authenticating Mobile Users via Game Playing
- Fuzzy Authentication using Rank Distance
- A McEliece-based Key Exchange Protocol for Optical Communication Systems
- An ICN-based Authentication Protocol for a Simplified LTE Architecture.