Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2011
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 UER01 Volltext |
Zusammenfassung: | This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9780511977985 |
DOI: | 10.1017/CBO9780511977985 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043943454 | ||
003 | DE-604 | ||
005 | 20190724 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2011 |||| o||u| ||||||eng d | ||
020 | |a 9780511977985 |c Online |9 978-0-511-97798-5 | ||
024 | 7 | |a 10.1017/CBO9780511977985 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511977985 | ||
035 | |a (OCoLC)839035176 | ||
035 | |a (DE-599)BVBBV043943454 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-29 |a DE-92 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Bloch, Matthieu |e Verfasser |0 (DE-588)1017343047 |4 aut | |
245 | 1 | 0 | |a Physical-layer security |b from information theory to security engineering |c Matthieu Bloch & Joao Barros |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2011 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a OSI-Modell |0 (DE-588)4201284-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Physikalische Schicht |0 (DE-588)4293049-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a OSI-Modell |0 (DE-588)4201284-3 |D s |
689 | 0 | 1 | |a Physikalische Schicht |0 (DE-588)4293049-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Barros, João |d 1976- |e Sonstige |0 (DE-588)129608181 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-521-51650-1 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511977985 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029352425 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9780511977985 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511977985 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511977985 |l UER01 |p ZDB-20-CBO |q UER_PDA_CBO_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176887357898752 |
---|---|
any_adam_object | |
author | Bloch, Matthieu |
author_GND | (DE-588)1017343047 (DE-588)129608181 |
author_facet | Bloch, Matthieu |
author_role | aut |
author_sort | Bloch, Matthieu |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV043943454 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9780511977985 (OCoLC)839035176 (DE-599)BVBBV043943454 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1017/CBO9780511977985 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02923nmm a2200481zc 4500</leader><controlfield tag="001">BV043943454</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190724 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511977985</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-97798-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511977985</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511977985</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)839035176</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043943454</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bloch, Matthieu</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1017343047</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical-layer security</subfield><subfield code="b">from information theory to security engineering</subfield><subfield code="c">Matthieu Bloch & Joao Barros</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">OSI-Modell</subfield><subfield code="0">(DE-588)4201284-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Physikalische Schicht</subfield><subfield code="0">(DE-588)4293049-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">OSI-Modell</subfield><subfield code="0">(DE-588)4201284-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Physikalische Schicht</subfield><subfield code="0">(DE-588)4293049-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barros, João</subfield><subfield code="d">1976-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)129608181</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-521-51650-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511977985</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029352425</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511977985</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511977985</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511977985</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UER_PDA_CBO_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043943454 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:19Z |
institution | BVB |
isbn | 9780511977985 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029352425 |
oclc_num | 839035176 |
open_access_boolean | |
owner | DE-12 DE-29 DE-92 |
owner_facet | DE-12 DE-29 DE-92 |
physical | 1 Online-Ressource |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO ZDB-20-CBO UER_PDA_CBO_Kauf |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Bloch, Matthieu Verfasser (DE-588)1017343047 aut Physical-layer security from information theory to security engineering Matthieu Bloch & Joao Barros Cambridge Cambridge University Press 2011 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included Computer networks / Security measures Computer security OSI-Modell (DE-588)4201284-3 gnd rswk-swf Physikalische Schicht (DE-588)4293049-2 gnd rswk-swf OSI-Modell (DE-588)4201284-3 s Physikalische Schicht (DE-588)4293049-2 s 1\p DE-604 Barros, João 1976- Sonstige (DE-588)129608181 oth Erscheint auch als Druck-Ausgabe, Hardcover 978-0-521-51650-1 https://doi.org/10.1017/CBO9780511977985 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Bloch, Matthieu Physical-layer security from information theory to security engineering Computer networks / Security measures Computer security OSI-Modell (DE-588)4201284-3 gnd Physikalische Schicht (DE-588)4293049-2 gnd |
subject_GND | (DE-588)4201284-3 (DE-588)4293049-2 |
title | Physical-layer security from information theory to security engineering |
title_auth | Physical-layer security from information theory to security engineering |
title_exact_search | Physical-layer security from information theory to security engineering |
title_full | Physical-layer security from information theory to security engineering Matthieu Bloch & Joao Barros |
title_fullStr | Physical-layer security from information theory to security engineering Matthieu Bloch & Joao Barros |
title_full_unstemmed | Physical-layer security from information theory to security engineering Matthieu Bloch & Joao Barros |
title_short | Physical-layer security |
title_sort | physical layer security from information theory to security engineering |
title_sub | from information theory to security engineering |
topic | Computer networks / Security measures Computer security OSI-Modell (DE-588)4201284-3 gnd Physikalische Schicht (DE-588)4293049-2 gnd |
topic_facet | Computer networks / Security measures Computer security OSI-Modell Physikalische Schicht |
url | https://doi.org/10.1017/CBO9780511977985 |
work_keys_str_mv | AT blochmatthieu physicallayersecurityfrominformationtheorytosecurityengineering AT barrosjoao physicallayersecurityfrominformationtheorytosecurityengineering |