• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Securing Wireless Communications at the Physical Layer » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Securing Wireless Communications at the Physical Layer

ISBN-13: 9781489983756 / Angielski / Miękka / 2014 / 396 str.

Ruoheng Liu;Wade Trappe
Securing Wireless Communications at the Physical Layer Ruoheng Liu Wade Trappe  9781489983756 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Securing Wireless Communications at the Physical Layer

ISBN-13: 9781489983756 / Angielski / Miękka / 2014 / 396 str.

Ruoheng Liu;Wade Trappe
cena 605,23
(netto: 576,41 VAT:  5%)

Najniższa cena z 30 dni: 578,30
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!
inne wydania

Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity, mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives.Ontheothersideof thecoin, thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglecte

Kategorie:
Technologie
Kategorie BISAC:
Computers > Security - Cryptography & Encryption
Computers > Computer Science
Technology & Engineering > Telecommunications
Wydawca:
Springer
Język:
Angielski
ISBN-13:
9781489983756
Rok wydania:
2014
Wydanie:
2010
Ilość stron:
396
Waga:
0.63 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Secrecy Capacity of Independent Parallel Channels.- Obtaining Secrecy through Intentional Uncertainty.- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel.- Cooperative Jamming: The Tale of Friendly Interference for Secrecy.- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications.- Secret Communication Under Channel Uncertainty.- Cooperative Secrecy in Wireless Communications.- Source Coding under Secrecy Constraints.- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels.- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems.- Secret Key Agreement Techniques based on Multipath Propagation Characteristics.- Secret Communication over Fading Channels.- Fingerprints in the Ether: Channel-Based Authentication.- Message Authentication: Information Theoretic Bounds.- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement.- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels.

Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer.

Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored.

Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia