Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-e...
Saved in:
| Format: | Electronic eBook |
|---|---|
| Language: | English |
| Published: |
Cham :
Springer International Publishing,
2018.
|
| Edition: | 1st ed. 2018. |
| Series: | Lecture Notes in Electrical Engineering,
447 |
| Subjects: | |
| ISBN: | 9783319592657 |
| ISSN: | 1876-1100 ; |
| Online Access: |
|
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Loading…
Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats /
by: Donaldson, Scott E.
Published: (2018)
by: Donaldson, Scott E.
Published: (2018)
Loading…
Fault Tolerant Architectures for Cryptography and Hardware Security
Published: (2018)
Published: (2018)
Loading…
Algorithms and Applications ALAP 2018 /
Published: (2018)
Published: (2018)
Loading…
Physical Layer Security in Wireless Cooperative Networks
by: Wang, Li
Published: (2018)
by: Wang, Li
Published: (2018)
Loading…
Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 /
Published: (2018)
Published: (2018)
Loading…
Information and Communication Technology Proceedings of ICICT 2016 /
Published: (2018)
Published: (2018)
Loading…
Cyber Security: Power and Technology
Published: (2018)
Published: (2018)
Loading…
Wireless Personal Communications Simulation and Complexity /
by: A. M. El-Bendary, Mohsen
Published: (2018)
by: A. M. El-Bendary, Mohsen
Published: (2018)
Loading…
IT Convergence and Security 2017 Volume 2 /
Published: (2018)
Published: (2018)
Loading…
IT Convergence and Security 2017 Volume 1 /
Published: (2018)
Published: (2018)
Loading…
Computer and Network Security Essentials
Published: (2018)
Published: (2018)
Loading…
The Hardware Trojan War Attacks, Myths, and Defenses /
Published: (2018)
Published: (2018)
Loading…
Securing the Perimeter Deploying Identity and Access Management with Free Open Source Software /
by: Schwartz, Michael
Published: (2018)
by: Schwartz, Michael
Published: (2018)
Loading…
Intelligent Computing and Information and Communication Proceedings of 2nd International Conference, ICICC 2017 /
Published: (2018)
Published: (2018)
Loading…
Proceedings of the International Conference on Computing and Communication Systems I3CS 2016, NEHU, Shillong, India /
Published: (2018)
Published: (2018)
Loading…
Cohesive Subgraph Computation over Large Sparse Graphs Algorithms, Data Structures, and Programming Techniques /
by: Chang, Lijun
Published: (2018)
by: Chang, Lijun
Published: (2018)
Loading…
Reconfigurable Cryptographic Processor
by: Liu, Leibo
Published: (2018)
by: Liu, Leibo
Published: (2018)
Loading…
Practical Information Security A Competency-Based Education Course /
by: Alsmadi, Izzat
Published: (2018)
by: Alsmadi, Izzat
Published: (2018)
Loading…
Pro iOS Security and Forensics Enterprise iPhone and iPad Safety /
by: Butow, Eric
Published: (2018)
by: Butow, Eric
Published: (2018)
Loading…
Information and Communication Technology for Sustainable Development Proceedings of ICT4SD 2016, Volume 2 /
Published: (2018)
Published: (2018)
Loading…
Networking Communication and Data Knowledge Engineering Volume 2 /
Published: (2018)
Published: (2018)
Loading…
Information and Communication Technology for Sustainable Development Proceedings of ICT4SD 2016, Volume 1 /
Published: (2018)
Published: (2018)
Loading…
Ambient Communications and Computer Systems RACCCS 2017 /
Published: (2018)
Published: (2018)
Loading…
Networking Communication and Data Knowledge Engineering Volume 1 /
Published: (2018)
Published: (2018)
Loading…
Concurrency Control in Distributed System Using Mutual Exclusion
by: Kanrar, Sukhendu
Published: (2018)
by: Kanrar, Sukhendu
Published: (2018)
Loading…
Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications /
Published: (2018)
Published: (2018)
Loading…
Recent Trends in Information and Communication Technology Proceedings of the 2nd International Conference of Reliable Information and Communication Technology (IRICT 2017) /
Published: (2018)
Published: (2018)
Loading…
Intelligent Communication and Computational Technologies Proceedings of Internet of Things for Technological Development, IoT4TD 2017 /
Published: (2018)
Published: (2018)
Loading…
Dynamic Games for Network Security
by: He, Xiaofan
Published: (2018)
by: He, Xiaofan
Published: (2018)
Loading…
Emerging Research in Computing, Information, Communication and Applications ERCICA 2016 /
Published: (2018)
Published: (2018)
Loading…
Arbres pour l'Algorithmique
by: Chauvin, Brigitte
Published: (2018)
by: Chauvin, Brigitte
Published: (2018)
Loading…
Advances in Data and Information Sciences Proceedings of ICDIS-2017, Volume 1 /
Published: (2018)
Published: (2018)
Loading…
Cloud Security : Techniques and Applications /
Published: (2021)
Published: (2021)
Loading…
Cyber Security Proceedings of CSI 2015 /
Published: (2018)
Published: (2018)
Loading…
Proceedings of the International Conference on Microelectronics, Computing & Communication Systems MCCS 2015 /
Published: (2018)
Published: (2018)
Loading…
Advances in Big Data and Cloud Computing
Published: (2018)
Published: (2018)
Loading…
Link-Layer Cooperative Communication in Vehicular Networks
by: Bharati, Sailesh
Published: (2018)
by: Bharati, Sailesh
Published: (2018)
Loading…
Advanced Computing and Systems for Security Volume Five /
Published: (2018)
Published: (2018)
Loading…
Advanced Computing and Systems for Security Volume Six /
Published: (2018)
Published: (2018)
Loading…
Data Mining Algorithms in C++ Data Patterns and Algorithms for Modern Applications /
by: Masters, Timothy
Published: (2018)
by: Masters, Timothy
Published: (2018)
Similar Items
-
Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats /
by: Donaldson, Scott E.
Published: (2018) -
Fault Tolerant Architectures for Cryptography and Hardware Security
Published: (2018) -
Algorithms and Applications ALAP 2018 /
Published: (2018) -
Physical Layer Security in Wireless Cooperative Networks
by: Wang, Li
Published: (2018) -
Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 /
Published: (2018)

