0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach (1st ed. 2023): Yulong... Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach (1st ed. 2023)
Yulong Shen, Yuanyu Zhang, Xiaohong Jiang
R5,292 Discovery Miles 52 920 Ships in 10 - 15 working days

This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities.  When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming.  Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book  presents security-aware routing in wireless networks based on physical layer secure communication techniques. This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Albertina Sisulu
Sindiwe Magona, Elinor Sisulu Paperback R200 R172 Discovery Miles 1 720
Bullsh!t - 50 Fibs That Made South…
Jonathan Ancer Paperback  (2)
R270 R180 Discovery Miles 1 800
Sabotage - Eskom Under Siege
Kyle Cowan Paperback  (2)
R320 R250 Discovery Miles 2 500
So Lyk 'n Vrou - My 40 Jaar Van Hel Saam…
Ilse Verster Paperback  (1)
R290 R249 Discovery Miles 2 490
Mission Of Malice - My Exodus From…
Erika Bornman Paperback  (8)
R260 R224 Discovery Miles 2 240
Dare To Believe - Why I Could Not Stay…
Mmusi Maimane Paperback R350 R249 Discovery Miles 2 490
Bibby's - More Good Food
Dianne Bibby Hardcover R480 R340 Discovery Miles 3 400
A Seed Of A Dream - Morris Isaacson High…
Clive Glaser Paperback R265 R195 Discovery Miles 1 950
Herontdek Jou Selfvertroue - Sewe Stappe…
Rolene Strauss Paperback  (1)
R330 R284 Discovery Miles 2 840
The Future - 60 Key Trends for South…
Dion Chang, Bronwyn Williams, … Paperback R350 R255 Discovery Miles 2 550

 

Partners