My Library

University LibraryCatalogue

For faster,
Use Lean
Get it now
Don't show me again

LEADER 00000cam a2200637Mi 4500 
003    OCoLC 
005    20190319060730.6 
006    m        d         
007    cr |n||||||||| 
008    170713s2018    sz      o     000 0 eng d 
015    GBB8N7777|2bnb 
019    SpringerEBAon1021276153 
020    9783319592657 
020    3319592653 
020    |z9783319592640|q(print) 
020    |z3319592645 
024 7  10.1007/978-3-319-59265-7|2doi 
037    com.springer.onix.9783319592657|bSpringer Nature 
040    VT2|beng|erda|cVT2|dOCLCF|dOCLCO|dOCLCA|dUWO|dYDX|dN$T
049    MAIN 
050  4 TK5102.85|b.W67 2017 
050  4 TK1-9971 
082 04 621.382|223 
111 2  Workshop on Communication Security|n(2nd :|d2017 :|cParis,
245 10 Proceedings of the 2nd Workshop on Communication Security 
       :|bcryptography and physical layer security /|cMarco Baldi,
       Elizabeth A. Quaglia, Stefano Tomasin, editors. 
246 3  Proceedings of the second Workshop on Communication 
264  1 Cham :|bSpringer,|c[2018] 
300    1 online resource (xiii, 141 pages) :|b27 illustrations, 
       14 illustrations in color 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file|bPDF|2rda 
490 1  Lecture Notes in Electrical Engineering,|v447 
504    Includes bibliographical references and author index. 
505 0  A Study of Injection and Jamming Attacks in Wireless 
       Secret Sharing Systems -- Robust Secret Sharing for End-to
       -End Key Establishment with Physical Layer Keys under 
       Active Attacks -- Semantically-Secured Message-Key Trade-
       off over Wiretap Channels with Random Parameters -- Hash-
       then-Encode: A Modular Semantically Secure Wiretap Code --
       A CCA-Secure Cryptosystem Using Massive MIMO Channels -- 
       You Are How You Play: Authenticating Mobile Users via Game
       Playing -- Fuzzy Authentication using Rank Distance -- A 
       McEliece-based Key Exchange Protocol for Optical 
       Communication Systems -- An ICN-based Authentication 
       Protocol for a Simplified LTE Architecture. 
520    This book focuses on techniques that can be applied at the
       physical and data-link layers of communication systems in 
       order to secure transmissions against eavesdroppers. It 
       discusses topics ranging from information theory-based 
       security to coding for security and cryptography, and 
       presents cutting-edge research and innovative findings 
       from leading researchers. The characteristic feature of 
       all the contributions in this book is their relevance for 
       the practical application of security principles to a 
       variety of widely used communication techniques, including
       : multiantenna systems, ultra-wide-band communication 
       systems, power line communications, and quantum key 
       distribution techniques. A further distinctive aspect is 
       the attention paid to both unconditional and computational
       security techniques, building a bridge between two usually
       distinct worlds. The book gathers extended versions of 
       contributions delivered at the Second Workshop on 
       Communication Security, held in Paris, France, in April 
       2017 and affiliated with the conference EUROCRYPT 2017. 
650  0 Telecommunication systems|xSecurity measures|vCongresses. 
650  0 Data encryption (Computer science)|vCongresses. 
650  0 Computer networks|xSecurity measures|vCongresses. 
655  4 Electronic books. 
655  7 Conference papers and proceedings.|2fast
700 1  Baldi, Marco|c(Assistant professor in telecommunications),
700 1  Quaglia, Elizabeth A.,|eeditor 
700 1  Tomasin, Stefano,|eeditor 
710 2  SpringerLink|eissuing body. 
776 08 |iPrinted edition:|z9783319592640|w(OCoLC)985082598 
830  0 Lecture notes in electrical engineering ;|v447. 
830  0 Springer Engineering eBooks 2018 English+International 
856 40 |u|zConnect to 
       ebook (University of Melbourne only) 
990    Springer EBA e-book collections for 2017-2019 
990    Springer Engineeriing 2018 
990    Batch Ebook load (bud2) - do not edit, delete or attach 
       any records. 
991    |zNEW New collection springerlink.ebooksengine2018 2019-03
Location Call No. Status