Physical and Data-Link Security Techniques for Future Communication Systems

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book Physical and Data-Link Security Techniques for Future Communication Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319236094
Publisher: Springer International Publishing Publication: September 24, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783319236094
Publisher: Springer International Publishing
Publication: September 24, 2015
Imprint: Springer
Language: English

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

More books from Springer International Publishing

Cover of the book Engineering Ethics for a Globalized World by
Cover of the book The Internal Structure of U. S. Consumption Expenditures by
Cover of the book Capitalism, Hegemony and Violence in the Age of Drones by
Cover of the book Models, Methods, and Tools for Complex Chip Design by
Cover of the book Organometallics for Green Catalysis by
Cover of the book The Perception and Cognition of Visual Space by
Cover of the book Lie Groups, Differential Equations, and Geometry by
Cover of the book Organic Amendments and Soil Suppressiveness in Plant Disease Management by
Cover of the book Research in Attacks, Intrusions, and Defenses by
Cover of the book Landscape Ecology for Sustainable Society by
Cover of the book African Traditional Medicine: Autonomy and Informed Consent by
Cover of the book Advances in Face Detection and Facial Image Analysis by
Cover of the book CEOs and White-Collar Crime by
Cover of the book Next Generation Sensors and Systems by
Cover of the book Infectious Complications in Cancer Patients by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy