|
|
|
|
LEADER |
03482nam a2200505 4500 |
001 |
978-3-319-61863-0 |
003 |
DE-He213 |
005 |
20191027162108.0 |
007 |
cr nn 008mamaa |
008 |
170831s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319618630
|9 978-3-319-61863-0
|
024 |
7 |
|
|a 10.1007/978-3-319-61863-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
100 |
1 |
|
|a Wang, Li.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Physical Layer Security in Wireless Cooperative Networks
|h [electronic resource] /
|c by Li Wang.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XVII, 181 p. 10 illus., 3 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Wireless Networks,
|x 2366-1186
|
505 |
0 |
|
|a 1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary.
|
520 |
|
|
|a This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/T24035
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319618623
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319618647
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319871790
|
830 |
|
0 |
|a Wireless Networks,
|x 2366-1186
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-61863-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|