Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Physical-Layer Security: From Information Theory to Security Engineering

Buy
This book is the result of more than five years of intensive research in collaboration with a large number of people. Since the beginning, our goal has been to understand at a deeper level how information-theoretic security ideas can help build more secure networks and communication systems. Back in 2008, the actual planwas to finish the manuscript within one year, which for some reason seemed a fairly reasonable proposition at that time.

Needless to say, we were thoroughly mistaken. The pace at which physical-layer security topics have found their way into the main journals and conferences in communications and information theory is simply staggering. In fact, there is now a vibrant scientific community uncovering the benefits of looking at the physical layer from a security point of view and producing new results every day. Writing a book on physical-layer security thus felt like shooting at not one but multiple moving targets.

To preserve our sanity we decided to go back to basics and focus on how to bridge the gap between theory and practice. It did not take long to realize that the book would have to appeal simultaneously to information theorists, cryptographers, and network-security specialists. More precisely, the material could and should provide a common ground for fruitful interactions between those who speak the language of security and those who for a very long time focused mostly on the challenges of communicating over noisy channels. Therefore, we opted for a mathematical treatment that addresses the fundamental aspects of information-theoretic security, while providing enough background on cryptographic protocols to allow an eclectic and synergistic approach to the design of security systems.

The book is intended for several different groups: (a) communication engineers and security specialists who wish to understand the fundamentals of physical-layer security and apply them in the development of real-life systems, (b) scientists who aim at creating new knowledge in information-theoretic security and applications, (c) graduate students who wish to be trained in the fundamental techniques, and (d) decision makers who seek to evaluate the potential benefits of physical-layer security. If this book leads to many exciting discussions at the white board among diverse groups of people, then our goal will have been achieved.
(HTML tags aren't allowed.)

Docker Cookbook
Docker Cookbook

80 hands-on recipes to efficiently work with the Docker 1.6 environment on Linux About This Book Provides practical techniques and knowledge of various emerging and developing APIs to help you create scalable services Create, manage, and automate production-quality services while dealing with inherent issues. Each recipe is carefully...

Online Damage Detection in Structural Systems: Applications of Proper Orthogonal Decomposition, and Kalman and Particle Filters (SpringerBriefs in Applied Sciences and Technology)
Online Damage Detection in Structural Systems: Applications of Proper Orthogonal Decomposition, and Kalman and Particle Filters (SpringerBriefs in Applied Sciences and Technology)

This monograph assesses in depth the application of recursive Bayesian filters in structural health monitoring. Although the methods and algorithms used here are well established in the field of automatic control, their application in the realm of civil engineering has to date been limited. The monograph is therefore intended as a reference...

Moments and Moment Invariants in Pattern Recognition
Moments and Moment Invariants in Pattern Recognition

Automatic object recognition has become an established discipline in image analysis. Moments and moment invariants play a very important role as features in invariant recognition. They were introduced to the pattern recognition community almost 50 years ago and the mathematical background they utilized is even older, originating from the...


Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
When I wrote the first edition of this book, the RS-232 serial port was the workhorse of PC interfaces. Modems and scores of other peripherals connected to PCs via the serial ports that were present on every machine.

When the Universal Serial Bus (USB) took hold in the late 1990s, many predicted that serial ports would soon be obsolete.
...
CISCO TCP/IP Routing Professional Reference, Revised and Expanded
CISCO TCP/IP Routing Professional Reference, Revised and Expanded
An absolute gem of a reference guide, Cisco TCP/IP Routing Professional Reference brings the empyreal realm of routers and protocols solidly to earth. The author provides excellent analogies coupled with practical tips, making this book suitable for those new to the strange terrain of Cisco routers and TCP/IP networking as well as for the...
Beginning DirectX 10 Game Programming
Beginning DirectX 10 Game Programming
Discover the exciting world of game programming and 3D graphics creation using DirectX 10! "Beginning DirectX® 10 Game Progmramming" is an introductory guide to creating fantastic graphics, amazing creatures, and realistic worlds for games. Written specifically for the beginner programmer, the book uses step-by-step instructions to...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy