000 04153nam a22006015i 4500
001 978-3-319-59265-7
003 DE-He213
005 20220801214728.0
007 cr nn 008mamaa
008 170713s2018 sz | s |||| 0|eng d
020 _a9783319592657
_9978-3-319-59265-7
024 7 _a10.1007/978-3-319-59265-7
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aProceedings of the 2nd Workshop on Communication Security
_h[electronic resource] :
_bCryptography and Physical Layer Security /
_cedited by Marco Baldi, Elizabeth A. Quaglia, Stefano Tomasin.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXIII, 141 p. 27 illus., 14 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v447
505 0 _aA Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems -- Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks -- Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters -- Hash-then-Encode: A Modular Semantically Secure Wiretap Code -- A CCA-Secure Cryptosystem Using Massive MIMO Channels -- You Are How You Play: Authenticating Mobile Users via Game Playing -- Fuzzy Authentication using Rank Distance -- A McEliece-based Key Exchange Protocol for Optical Communication Systems -- An ICN-based Authentication Protocol for a Simplified LTE Architecture.
520 _aThis book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aAlgorithms.
_93390
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aAlgorithms.
_93390
700 1 _aBaldi, Marco.
_eeditor.
_0(orcid)0000-0002-8754-5526
_1https://orcid.org/0000-0002-8754-5526
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_940083
700 1 _aQuaglia, Elizabeth A.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_940084
700 1 _aTomasin, Stefano.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_940085
710 2 _aSpringerLink (Online service)
_940086
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319592640
776 0 8 _iPrinted edition:
_z9783319592664
776 0 8 _iPrinted edition:
_z9783319865843
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v447
_940087
856 4 0 _uhttps://doi.org/10.1007/978-3-319-59265-7
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76681
_d76681