Fr. 156.00

Physical-Layer Security - From Information Theory to Security Engineering

English · Hardback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor Matthieu Bloch is an Assistant Professor in the School of Electrical Engineering of the Georgia Institute of Technology. He received a Ph.D. in Engineering Science from the Université de Franche-Comté, Besançon, France, in 2006, and a Ph.D. in Electrical Engineering from the Georgia Institute of Technology in 2008. His research interests are in the areas of information theory, error-control coding, wireless communications and quantum cryptography. João Barros is an Associate Professor in the Department of Electrical and Computer Engineering of the Faculdade de Engenharia da Universidade do Porto, and the Coordinator of the Porto Laboratory of the Instituto de Telecomunicações in Portugal. He received his Ph.D. in Electrical Engineering and Information Technology from the Technische Universitaet Muenchen (TUM), Germany, in 2004 and has since published extensively in the general areas of information theory, communication networks and security. He has taught short courses and tutorials at various institutions and has received a Best Teaching Award from the Bavarian State Ministry of Sciences and the Arts. Klappentext Presents the theoretical foundations, practical implementation, challenges and benefits of physical-layer security, a groundbreaking new model for secure communication. Zusammenfassung This complete guide to physical-layer security presents the theoretical foundations! practical implementation! challenges and benefits of a groundbreaking model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures! it provides tools that enable students! researchers and practitioners to build more secure systems. Inhaltsverzeichnis Part I. Preliminaries: 1. An information-theoretic approach to physical-layer security; 2. Fundamentals of information theory; Part II. Information-Theoretic Security: 3. Secrecy capacity; 4. Secret-key capacity; 5. Security limits of Gaussian and wireless channels; Part III. Coding and System Aspects: 6. Coding for secrecy; 7. System aspects; Part IV. Other Applications of Information-Theoretic Security: 8. Secrecy and jamming in multi-user channels; 8. Network coding security....

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.