Physical and Data-Link Security Techniques for Future Communication Systems

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book Physical and Data-Link Security Techniques for Future Communication Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319236094
Publisher: Springer International Publishing Publication: September 24, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783319236094
Publisher: Springer International Publishing
Publication: September 24, 2015
Imprint: Springer
Language: English

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

More books from Springer International Publishing

Cover of the book Egyptian Coastal Lakes and Wetlands: Part I by
Cover of the book The Transformation of Property Regimes and Transitional Justice in Central Eastern Europe by
Cover of the book Magnetic Nanoparticles by
Cover of the book Containing Madness by
Cover of the book Advances in Information and Communication Networks by
Cover of the book Democratic Socialism and Education: New Perspectives on Policy and Practice by
Cover of the book Women's Writing in Colombia by
Cover of the book Basic Prediction Techniques in Modern Video Coding Standards by
Cover of the book Advances in Culturally-Aware Intelligent Systems and in Cross-Cultural Psychological Studies by
Cover of the book Network, Smart and Open by
Cover of the book Education Reform: The Unwinding of Intelligence and Creativity by
Cover of the book Information Security and Cryptology - ICISC 2015 by
Cover of the book Mathematical Problems of the Dynamics of Incompressible Fluid on a Rotating Sphere by
Cover of the book New Technologies, Development and Application II by
Cover of the book Discovery Science by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy