Loading…

Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Baldi, Marco (Editor), Quaglia, Elizabeth A. (Editor), Tomasin, Stefano (Editor)
Format: e-Book
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2018.
Edition:1st ed. 2018.
Series:Lecture Notes in Electrical Engineering, 447
Subjects:
Online Access:Full-text access
View in OPAC
Table of Contents:
  • A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
  • Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
  • Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
  • Hash-then-Encode: A Modular Semantically Secure Wiretap Code
  • A CCA-Secure Cryptosystem Using Massive MIMO Channels
  • You Are How You Play: Authenticating Mobile Users via Game Playing
  • Fuzzy Authentication using Rank Distance
  • A McEliece-based Key Exchange Protocol for Optical Communication Systems
  • An ICN-based Authentication Protocol for a Simplified LTE Architecture.