Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Baldi, Marco (Editor, http://id.loc.gov/vocabulary/relators/edt), Quaglia, Elizabeth A. (Editor, http://id.loc.gov/vocabulary/relators/edt), Tomasin, Stefano (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2018.
Edition:1st ed. 2018.
Series:Lecture Notes in Electrical Engineering, 447
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
  • Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
  • Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
  • Hash-then-Encode: A Modular Semantically Secure Wiretap Code
  • A CCA-Secure Cryptosystem Using Massive MIMO Channels
  • You Are How You Play: Authenticating Mobile Users via Game Playing
  • Fuzzy Authentication using Rank Distance
  • A McEliece-based Key Exchange Protocol for Optical Communication Systems
  • An ICN-based Authentication Protocol for a Simplified LTE Architecture.