feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    Upper Saddle River, NJ [u.a.] :Pearson Prentice Hall,
    UID:
    almahu_BV021324599
    Format: XIV, 577 S. : , graph. Darst.
    Edition: 2. ed., Pearson internat. ed.
    ISBN: 0-13-198199-4
    Content: This text is for a course in cryptography for advanced undergraduate and graduate students. Material is accessible to mathematically mature students having little background in number theory and computer programming. Core material is treated in the first eight chapters on areas such as classical cryptosystems, basic number theory, the RSA algorithm, and digital signatures. The remaining nine chapters cover optional topics including secret sharing schemes, games, and information theory. Appendices contain computer examples in Mathematica, Maple, and MATLAB. The text can be taught without computers.
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    RVK:
    Keywords: Kryptologie ; Codierungstheorie ; Kryptologie ; Codierung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV041889586
    Format: 1 Online-Ressource
    ISBN: 9781441913852
    Note: Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications , Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-1-4419-1384-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV041968002
    Format: 1 Online-Ressource (VIII, 72 p.) , Ill.
    Edition: Online-Ausgabe Springer eBook Collection / Computer Science
    ISBN: 9783319073569
    Series Statement: SpringerBriefs in Computer Science
    Additional Edition: Reproduktion von Yang, Jie Pervasive Wireless Environments: Detecting and Localizing User Spoofing 2014
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-3-319-07355-2
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Informatik ; Ubiquitous Computing ; Datenschutz ; Drahtloses lokales Netz ; Verteiltes System
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    New York, NY : Springer-Verlag
    UID:
    kobvindex_ZLB14972416
    Format: XVII, 304 Seiten , graph. Darst.
    Edition: 1
    ISBN: 9780387688466 , 0387688463
    Note: Text engl.
    Language: English
    Keywords: Rechnernetz ; Datensicherung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages