|
Showing 1 - 4 of
4 matches in All Departments
This book focuses on techniques that can be applied at the physical
and data-link layers of communication systems in order to secure
transmissions against eavesdroppers. It discusses topics ranging
from information theory-based security to coding for security and
cryptography, and presents cutting-edge research and innovative
findings from leading researchers. The characteristic feature of
all the contributions in this book is their relevance for the
practical application of security principles to a variety of widely
used communication techniques, including: multiantenna systems,
ultra-wide-band communication systems, power line communications,
and quantum key distribution techniques. A further distinctive
aspect is the attention paid to both unconditional and
computational security techniques, building a bridge between two
usually distinct worlds. The book gathers extended versions of
contributions delivered at the Second Workshop on Communication
Security, held in Paris, France, in April 2017 and affiliated with
the conference EUROCRYPT 2017.
This book focuses on techniques that can be applied at the physical
and data-link layers of communication systems in order to secure
transmissions against eavesdroppers. It discusses topics ranging
from information theory-based security to coding for security and
cryptography, and presents cutting-edge research and innovative
findings from leading researchers. The characteristic feature of
all the contributions in this book is their relevance for the
practical application of security principles to a variety of widely
used communication techniques, including: multiantenna systems,
ultra-wide-band communication systems, power line communications,
and quantum key distribution techniques. A further distinctive
aspect is the attention paid to both unconditional and
computational security techniques, building a bridge between two
usually distinct worlds. The book gathers extended versions of
contributions delivered at the Second Workshop on Communication
Security, held in Paris, France, in April 2017 and affiliated with
the conference EUROCRYPT 2017.
This book focuses on techniques that can be applied at the physical
and data-link layers of communication systems in order to secure
transmissions against eavesdroppers. Topics ranging from
information theory-based security to coding for security and
cryptography are discussed, with presentation of cutting-edge
research and innovative results from leading researchers. The
characteristic feature of all the contributions is their relevance
for practical embodiments: detailed consideration is given to
applications of security principles to a variety of widely used
communication techniques such as multiantenna systems, ultra-wide
band communication systems, power line communications, and quantum
key distribution techniques. A further distinctive aspect is the
attention paid to both unconditional and computational security
techniques, providing a bridge between two usually distinct worlds.
The book comprises extended versions of contributions delivered at
the Workshop on Communication Security, held in Ancona, Italy, in
September 2014 within the framework of the research project
"Enhancing Communication Security by Cross-layer Physical and
Data-link Techniques", funded by the Italian Ministry of Education,
Universities, and Research.
This book focuses on techniques that can be applied at the physical
and data-link layers of communication systems in order to secure
transmissions against eavesdroppers. Topics ranging from
information theory-based security to coding for security and
cryptography are discussed, with presentation of cutting-edge
research and innovative results from leading researchers. The
characteristic feature of all the contributions is their relevance
for practical embodiments: detailed consideration is given to
applications of security principles to a variety of widely used
communication techniques such as multiantenna systems, ultra-wide
band communication systems, power line communications, and quantum
key distribution techniques. A further distinctive aspect is the
attention paid to both unconditional and computational security
techniques, providing a bridge between two usually distinct worlds.
The book comprises extended versions of contributions delivered at
the Workshop on Communication Security, held in Ancona, Italy, in
September 2014 within the framework of the research project
"Enhancing Communication Security by Cross-layer Physical and
Data-link Techniques", funded by the Italian Ministry of Education,
Universities, and Research.
|
|