Read more
Informationen zum Autor Matthieu Bloch is an Assistant Professor in the School of Electrical Engineering of the Georgia Institute of Technology. He received a Ph.D. in Engineering Science from the Université de Franche-Comté, Besançon, France, in 2006, and a Ph.D. in Electrical Engineering from the Georgia Institute of Technology in 2008. His research interests are in the areas of information theory, error-control coding, wireless communications and quantum cryptography. João Barros is an Associate Professor in the Department of Electrical and Computer Engineering of the Faculdade de Engenharia da Universidade do Porto, and the Coordinator of the Porto Laboratory of the Instituto de Telecomunicações in Portugal. He received his Ph.D. in Electrical Engineering and Information Technology from the Technische Universitaet Muenchen (TUM), Germany, in 2004 and has since published extensively in the general areas of information theory, communication networks and security. He has taught short courses and tutorials at various institutions and has received a Best Teaching Award from the Bavarian State Ministry of Sciences and the Arts. Klappentext Presents the theoretical foundations, practical implementation, challenges and benefits of physical-layer security, a groundbreaking new model for secure communication. Zusammenfassung This complete guide to physical-layer security presents the theoretical foundations! practical implementation! challenges and benefits of a groundbreaking model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures! it provides tools that enable students! researchers and practitioners to build more secure systems. Inhaltsverzeichnis Part I. Preliminaries: 1. An information-theoretic approach to physical-layer security; 2. Fundamentals of information theory; Part II. Information-Theoretic Security: 3. Secrecy capacity; 4. Secret-key capacity; 5. Security limits of Gaussian and wireless channels; Part III. Coding and System Aspects: 6. Coding for secrecy; 7. System aspects; Part IV. Other Applications of Information-Theoretic Security: 8. Secrecy and jamming in multi-user channels; 8. Network coding security....