Buch, Englisch, 396 Seiten, Format (B × H): 166 mm x 244 mm, Gewicht: 1670 g
ISBN: 978-1-4419-1384-5
Verlag: Springer Us
communication), is generally neglected.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Drahtlostechnologie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
Weitere Infos & Material
Secrecy Capacity of Independent Parallel Channels.- Obtaining Secrecy through Intentional Uncertainty.- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel.- Cooperative Jamming: The Tale of Friendly Interference for Secrecy.- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications.- Secret Communication Under Channel Uncertainty.- Cooperative Secrecy in Wireless Communications.- Source Coding under Secrecy Constraints.- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels.- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems.- Secret Key Agreement Techniques based on Multipath Propagation Characteristics.- Secret Communication over Fading Channels.- Fingerprints in the Ether: Channel-Based Authentication.- Message Authentication: Information Theoretic Bounds.- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement.- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels.