000 04083nam a22005055i 4500
001 978-3-319-23609-4
003 DE-He213
005 20200421111656.0
007 cr nn 008mamaa
008 150924s2016 gw | s |||| 0|eng d
020 _a9783319236094
_9978-3-319-23609-4
024 7 _a10.1007/978-3-319-23609-4
_2doi
050 4 _aTK1-9971
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
082 0 4 _a621.382
_223
245 1 0 _aPhysical and Data-Link Security Techniques for Future Communication Systems
_h[electronic resource] /
_cedited by Marco Baldi, Stefano Tomasin.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aX, 212 p. 54 illus., 4 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1100 ;
_v358
505 0 _aPhysical Layer Security: a Paradigm Shift in Data Confidentiality -- Secure Communication in Wiretap Channels with Partial and Statistical CSI at the Transmitter -- MIMOME Gaussian Channels with GMM Signals in High-SNR Regime: Fundamental Limits and Tradeoffs -- Performance Analysis of Transmission Over AWGN Wiretap Channels With Practical Codes -- Broadcast Channels with Confidential Messages: Channel Uncertainty, Robustness, and Continuity -- End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models -- Experimental Results on Secret-Key Extraction from Unsynchronized UWB Channel Observations -- Physical Layer Security in Power Line Communication Networks -- Security Aspects of Compressed Sensing -- Subspace Fuzzy Vault -- An Information Rate Improvement For a Polynomial Variant of the Naccache-Stern Knapsack Cryptosystem -- Implementation and Improvement of the Partial Sum Attack on 6-round AES -- A Real Life Project in Cryptography: Assessment of RSA Keys -- Encoding in The DTMF Channel for Two-Channel Authentication.
520 _a This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.
650 0 _aEngineering.
650 0 _aComputer security.
650 0 _aElectrical engineering.
650 1 4 _aEngineering.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aSystems and Data Security.
650 2 4 _aSignal, Image and Speech Processing.
700 1 _aBaldi, Marco.
_eeditor.
700 1 _aTomasin, Stefano.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319236087
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1100 ;
_v358
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-23609-4
912 _aZDB-2-ENG
942 _cEBK
999 _c54715
_d54715