This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such...
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions aga...
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions aga...