Physical and Data-Link Security Techniques for Future Communication Systems

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book Physical and Data-Link Security Techniques for Future Communication Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319236094
Publisher: Springer International Publishing Publication: September 24, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783319236094
Publisher: Springer International Publishing
Publication: September 24, 2015
Imprint: Springer
Language: English

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

More books from Springer International Publishing

Cover of the book From Financial Crisis to Social Change by
Cover of the book Computer and Information Sciences by
Cover of the book Advances in Human Factors in Wearable Technologies and Game Design by
Cover of the book International Politics and Inner Worlds by
Cover of the book Declining International Cooperation on Pesticide Regulation by
Cover of the book Biennial Review of Infertility by
Cover of the book Advances in Artificial Intelligence - IBERAMIA 2016 by
Cover of the book Thomas Hobbes's Conception of Peace by
Cover of the book Beneficial Ownership by
Cover of the book Translation and the Intersection of Texts, Contexts and Politics by
Cover of the book Advances in Biomedicine by
Cover of the book Theoretical Orientations and Practical Applications of Psychological Ownership by
Cover of the book Glowworm Swarm Optimization by
Cover of the book Complications of CSF Shunting in Hydrocephalus by
Cover of the book Beavers: Boreal Ecosystem Engineers by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy