Securing Wireless Communications at the Physical Layer (Record no. 1427)

000 -LEADER
fixed length control field 04657nam a22005175i 4500
001 - CONTROL NUMBER
control field 978-1-4419-1385-2
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20141014113443.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2010 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781441913852
-- 978-1-4419-1385-2
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4419-1385-2
Source of number or code doi
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK1-9971
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJK
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC041000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.382
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Liu, Ruoheng.
Relator term editor.
245 10 - TITLE STATEMENT
Title Securing Wireless Communications at the Physical Layer
Medium [electronic resource] /
Statement of responsibility, etc edited by Ruoheng Liu, Wade Trappe.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston, MA :
Name of publisher, distributor, etc Springer US,
Date of publication, distribution, etc 2010.
264 #1 -
-- Boston, MA :
-- Springer US,
-- 2010.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 396 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels.
520 ## - SUMMARY, ETC.
Summary, etc Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Signal, Image and Speech Processing.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Structures, Cryptology and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Trappe, Wade.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781441913845
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4419-1385-2
912 ## -
-- ZDB-2-ENG
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books

No items available.


Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha