Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...

Full description

Bibliographic Details
Other Authors: Baldi, Marco (Editor), Quaglia, Elizabeth A. (Editor), Tomasin, Stefano (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2018, 2018
Edition:1st ed. 2018
Series:Lecture Notes in Electrical Engineering
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
  • Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
  • Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
  • Hash-then-Encode: A Modular Semantically Secure Wiretap Code
  • A CCA-Secure Cryptosystem Using Massive MIMO Channels
  • You Are How You Play: Authenticating Mobile Users via Game Playing
  • Fuzzy Authentication using Rank Distance
  • A McEliece-based Key Exchange Protocol for Optical Communication Systems
  • An ICN-based Authentication Protocol for a Simplified LTE Architecture