Physical-layer security and quantum key distribution:
This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how th...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer
[2019]
|
Schlagworte: | |
Zusammenfassung: | This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material |
Beschreibung: | This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.- Integrates modern cryptography, physical-layer security, QKD, covert communication, and cyber security technologies and shows students how they can work together to solve issues- Does not require prior knowledge in corresponding fields or prerequisite material except basic concepts on vector algebra at undergraduate level.- Can be used in multiple courses, such as modern cryptography, physical-layer security, QKD, or a combination of these Introduction.- Information theory fundamentals.- Conventional cryptography fundamentals.- Physical-layer security (PLS).- Quantum information theory and quantum information processing fundamentals.- Quantum key distribution.- Discrete-variable (DV) QKD.- Continuous-variable (CV) QKD.- Measurement-device-independent (MDI).- Covert/stealth/low-probability of detection classical and quantum communications.- Cyber security, PLS, and QKD relationship.- Conclusion |
Beschreibung: | xv, 472 Seiten Illustrationen, Diagramme |
ISBN: | 9783030275648 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046925736 | ||
003 | DE-604 | ||
005 | 20230607 | ||
007 | t | ||
008 | 201005s2019 a||| |||| 00||| eng d | ||
020 | |a 9783030275648 |c hbk |9 978-3-030-27564-8 | ||
024 | 3 | |a 9783030275648 | |
035 | |a (OCoLC)1220879120 | ||
035 | |a (DE-599)BVBBV046925736 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-355 | ||
084 | |a ST 152 |0 (DE-625)143596: |2 rvk | ||
100 | 1 | |a Djordjevic, Ivan |e Verfasser |0 (DE-588)139947418 |4 aut | |
245 | 1 | 0 | |a Physical-layer security and quantum key distribution |c Ivan B. Djordjevic |
264 | 1 | |a Cham, Switzerland |b Springer |c [2019] | |
300 | |a xv, 472 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.- Integrates modern cryptography, physical-layer security, QKD, covert communication, and cyber security technologies and shows students how they can work together to solve issues- Does not require prior knowledge in corresponding fields or prerequisite material except basic concepts on vector algebra at undergraduate level.- Can be used in multiple courses, such as modern cryptography, physical-layer security, QKD, or a combination of these | ||
500 | |a Introduction.- Information theory fundamentals.- Conventional cryptography fundamentals.- Physical-layer security (PLS).- Quantum information theory and quantum information processing fundamentals.- Quantum key distribution.- Discrete-variable (DV) QKD.- Continuous-variable (CV) QKD.- Measurement-device-independent (MDI).- Covert/stealth/low-probability of detection classical and quantum communications.- Cyber security, PLS, and QKD relationship.- Conclusion | ||
520 | |a This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material | ||
650 | 4 | |a bicssc | |
650 | 4 | |a bisacsh | |
650 | 4 | |a Quantum computers | |
650 | 4 | |a Spintronics | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Applied mathematics | |
650 | 4 | |a Engineering mathematics | |
650 | 4 | |a Microwaves | |
650 | 4 | |a Optical engineering | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Physics | |
650 | 0 | 7 | |a Physikalische Schicht |0 (DE-588)4293049-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Quantenkryptologie |0 (DE-588)4596917-6 |2 gnd |9 rswk-swf |
653 | |a Hardcover, Softcover / Physik, Astronomie/Theoretische Physik | ||
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Physikalische Schicht |0 (DE-588)4293049-2 |D s |
689 | 0 | 2 | |a Quantenkryptologie |0 (DE-588)4596917-6 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-27565-5 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032334849 |
Datensatz im Suchindex
_version_ | 1804181816568971264 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Djordjevic, Ivan |
author_GND | (DE-588)139947418 |
author_facet | Djordjevic, Ivan |
author_role | aut |
author_sort | Djordjevic, Ivan |
author_variant | i d id |
building | Verbundindex |
bvnumber | BV046925736 |
classification_rvk | ST 152 |
ctrlnum | (OCoLC)1220879120 (DE-599)BVBBV046925736 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04982nam a2200553 c 4500</leader><controlfield tag="001">BV046925736</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230607 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">201005s2019 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030275648</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-030-27564-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783030275648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1220879120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046925736</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 152</subfield><subfield code="0">(DE-625)143596:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Djordjevic, Ivan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)139947418</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical-layer security and quantum key distribution</subfield><subfield code="c">Ivan B. Djordjevic</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 472 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.- Integrates modern cryptography, physical-layer security, QKD, covert communication, and cyber security technologies and shows students how they can work together to solve issues- Does not require prior knowledge in corresponding fields or prerequisite material except basic concepts on vector algebra at undergraduate level.- Can be used in multiple courses, such as modern cryptography, physical-layer security, QKD, or a combination of these</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction.- Information theory fundamentals.- Conventional cryptography fundamentals.- Physical-layer security (PLS).- Quantum information theory and quantum information processing fundamentals.- Quantum key distribution.- Discrete-variable (DV) QKD.- Continuous-variable (CV) QKD.- Measurement-device-independent (MDI).- Covert/stealth/low-probability of detection classical and quantum communications.- Cyber security, PLS, and QKD relationship.- Conclusion</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quantum computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spintronics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applied mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microwaves</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Physics</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Physikalische Schicht</subfield><subfield code="0">(DE-588)4293049-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Quantenkryptologie</subfield><subfield code="0">(DE-588)4596917-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardcover, Softcover / Physik, Astronomie/Theoretische Physik</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Physikalische Schicht</subfield><subfield code="0">(DE-588)4293049-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Quantenkryptologie</subfield><subfield code="0">(DE-588)4596917-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-27565-5</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032334849</subfield></datafield></record></collection> |
id | DE-604.BV046925736 |
illustrated | Illustrated |
index_date | 2024-07-03T15:32:48Z |
indexdate | 2024-07-10T08:57:40Z |
institution | BVB |
isbn | 9783030275648 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032334849 |
oclc_num | 1220879120 |
open_access_boolean | |
owner | DE-29T DE-355 DE-BY-UBR |
owner_facet | DE-29T DE-355 DE-BY-UBR |
physical | xv, 472 Seiten Illustrationen, Diagramme |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
spelling | Djordjevic, Ivan Verfasser (DE-588)139947418 aut Physical-layer security and quantum key distribution Ivan B. Djordjevic Cham, Switzerland Springer [2019] xv, 472 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.- Integrates modern cryptography, physical-layer security, QKD, covert communication, and cyber security technologies and shows students how they can work together to solve issues- Does not require prior knowledge in corresponding fields or prerequisite material except basic concepts on vector algebra at undergraduate level.- Can be used in multiple courses, such as modern cryptography, physical-layer security, QKD, or a combination of these Introduction.- Information theory fundamentals.- Conventional cryptography fundamentals.- Physical-layer security (PLS).- Quantum information theory and quantum information processing fundamentals.- Quantum key distribution.- Discrete-variable (DV) QKD.- Continuous-variable (CV) QKD.- Measurement-device-independent (MDI).- Covert/stealth/low-probability of detection classical and quantum communications.- Cyber security, PLS, and QKD relationship.- Conclusion This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material bicssc bisacsh Quantum computers Spintronics Electrical engineering Applied mathematics Engineering mathematics Microwaves Optical engineering Computer communication systems Physics Physikalische Schicht (DE-588)4293049-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Quantenkryptologie (DE-588)4596917-6 gnd rswk-swf Hardcover, Softcover / Physik, Astronomie/Theoretische Physik Kryptologie (DE-588)4033329-2 s Physikalische Schicht (DE-588)4293049-2 s Quantenkryptologie (DE-588)4596917-6 s DE-604 Erscheint auch als Online-Ausgabe 978-3-030-27565-5 |
spellingShingle | Djordjevic, Ivan Physical-layer security and quantum key distribution bicssc bisacsh Quantum computers Spintronics Electrical engineering Applied mathematics Engineering mathematics Microwaves Optical engineering Computer communication systems Physics Physikalische Schicht (DE-588)4293049-2 gnd Kryptologie (DE-588)4033329-2 gnd Quantenkryptologie (DE-588)4596917-6 gnd |
subject_GND | (DE-588)4293049-2 (DE-588)4033329-2 (DE-588)4596917-6 |
title | Physical-layer security and quantum key distribution |
title_auth | Physical-layer security and quantum key distribution |
title_exact_search | Physical-layer security and quantum key distribution |
title_exact_search_txtP | Physical-layer security and quantum key distribution |
title_full | Physical-layer security and quantum key distribution Ivan B. Djordjevic |
title_fullStr | Physical-layer security and quantum key distribution Ivan B. Djordjevic |
title_full_unstemmed | Physical-layer security and quantum key distribution Ivan B. Djordjevic |
title_short | Physical-layer security and quantum key distribution |
title_sort | physical layer security and quantum key distribution |
topic | bicssc bisacsh Quantum computers Spintronics Electrical engineering Applied mathematics Engineering mathematics Microwaves Optical engineering Computer communication systems Physics Physikalische Schicht (DE-588)4293049-2 gnd Kryptologie (DE-588)4033329-2 gnd Quantenkryptologie (DE-588)4596917-6 gnd |
topic_facet | bicssc bisacsh Quantum computers Spintronics Electrical engineering Applied mathematics Engineering mathematics Microwaves Optical engineering Computer communication systems Physics Physikalische Schicht Kryptologie Quantenkryptologie |
work_keys_str_mv | AT djordjevicivan physicallayersecurityandquantumkeydistribution |