Proceedings of the 2nd Workshop on Communication Security : cryptography and physical layer security /: cryptography and physical layer security. ([2018])
- Record Type:
- Book
- Title:
- Proceedings of the 2nd Workshop on Communication Security : cryptography and physical layer security /: cryptography and physical layer security. ([2018])
- Main Title:
- Proceedings of the 2nd Workshop on Communication Security : cryptography and physical layer security
- Other Titles:
- Proceedings of the second Workshop on Communication Security
- Further Information:
- Note: Marco Baldi, Elizabeth A. Quaglia, Stefano Tomasin, editors.
- Editors:
- (Assistant professor in telecommunications), Baldi, Marco
Quaglia, Elizabeth A
Tomasin, Stefano - Other Names:
- Workshop on Communication Security, 2nd
- Contents:
- A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems -- Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks -- Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters -- Hash-then-Encode: A Modular Semantically Secure Wiretap Code -- A CCA-Secure Cryptosystem Using Massive MIMO Channels -- You Are How You Play: Authenticating Mobile Users via Game Playing -- Fuzzy Authentication using Rank Distance -- A McEliece-based Key Exchange Protocol for Optical Communication Systems -- An ICN-based Authentication Protocol for a Simplified LTE Architecture.
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xiii, 141 pages), 27 illustrations, 14 illustrations in color
- Subjects:
- 621.382
Engineering
Telecommunication systems -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Algorithms
Computer security
Data encryption (Computer science)
Electrical engineering
Engineering
COMPUTERS -- Security -- General
Computers -- Programming -- Algorithms
Computer security
Coding theory & cryptology
Algorithms & data structures
Telecommunication
Computer security
Data encryption (Computer science)
Computer software
Technology & Engineering -- Telecommunications
Communications engineering / telecommunications
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319592657
3319592653 - Related ISBNs:
- 9783319592640
3319592645 - Notes:
- Note: Includes bibliographical references and author index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.365543
- Ingest File:
- 02_345.xml