Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2018, 2018
|
Edition: | 1st ed. 2018 |
Series: | Lecture Notes in Electrical Engineering
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
- Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
- Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
- Hash-then-Encode: A Modular Semantically Secure Wiretap Code
- A CCA-Secure Cryptosystem Using Massive MIMO Channels
- You Are How You Play: Authenticating Mobile Users via Game Playing
- Fuzzy Authentication using Rank Distance
- A McEliece-based Key Exchange Protocol for Optical Communication Systems
- An ICN-based Authentication Protocol for a Simplified LTE Architecture