000 | 04083nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-319-23609-4 | ||
003 | DE-He213 | ||
005 | 20200421111656.0 | ||
007 | cr nn 008mamaa | ||
008 | 150924s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319236094 _9978-3-319-23609-4 |
||
024 | 7 |
_a10.1007/978-3-319-23609-4 _2doi |
|
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aPhysical and Data-Link Security Techniques for Future Communication Systems _h[electronic resource] / _cedited by Marco Baldi, Stefano Tomasin. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aX, 212 p. 54 illus., 4 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v358 |
|
505 | 0 | _aPhysical Layer Security: a Paradigm Shift in Data Confidentiality -- Secure Communication in Wiretap Channels with Partial and Statistical CSI at the Transmitter -- MIMOME Gaussian Channels with GMM Signals in High-SNR Regime: Fundamental Limits and Tradeoffs -- Performance Analysis of Transmission Over AWGN Wiretap Channels With Practical Codes -- Broadcast Channels with Confidential Messages: Channel Uncertainty, Robustness, and Continuity -- End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models -- Experimental Results on Secret-Key Extraction from Unsynchronized UWB Channel Observations -- Physical Layer Security in Power Line Communication Networks -- Security Aspects of Compressed Sensing -- Subspace Fuzzy Vault -- An Information Rate Improvement For a Polynomial Variant of the Naccache-Stern Knapsack Cryptosystem -- Implementation and Improvement of the Partial Sum Attack on 6-round AES -- A Real Life Project in Cryptography: Assessment of RSA Keys -- Encoding in The DTMF Channel for Two-Channel Authentication. | |
520 | _a This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aSignal, Image and Speech Processing. |
700 | 1 |
_aBaldi, Marco. _eeditor. |
|
700 | 1 |
_aTomasin, Stefano. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319236087 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v358 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-23609-4 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c54715 _d54715 |