Atjaunināt sīkdatņu piekrišanu

Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security 1st ed. 2018 [Hardback]

Edited by , Edited by , Edited by
  • Formāts: Hardback, 141 pages, height x width: 235x155 mm, weight: 3613 g, 14 Illustrations, color; 13 Illustrations, black and white; XIII, 141 p. 27 illus., 14 illus. in color., 1 Hardback
  • Sērija : Lecture Notes in Electrical Engineering 447
  • Izdošanas datums: 14-Jul-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319592645
  • ISBN-13: 9783319592640
  • Hardback
  • Cena: 136,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 160,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 141 pages, height x width: 235x155 mm, weight: 3613 g, 14 Illustrations, color; 13 Illustrations, black and white; XIII, 141 p. 27 illus., 14 illus. in color., 1 Hardback
  • Sērija : Lecture Notes in Electrical Engineering 447
  • Izdošanas datums: 14-Jul-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319592645
  • ISBN-13: 9783319592640

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
1(14)
Arsenia Chorti
1 Introduction
1(1)
2 Secret Key Generation Systems in the Presence of an Active Adversary
2(2)
3 MiM in SKG Systems: Injection Attacks
4(4)
4 Jamming Attacks
8(4)
5 Conclusions
12(3)
References
13(2)
Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks
15(18)
Stefan Pfennig
Sabrina Engelmann
Elke Franz
Anne Wolf
1 Introduction
15(1)
2 System Model
16(3)
3 Physical Layer Key Generation
19(1)
4 End-to-End Key Establishment
20(11)
5 Conclusion
31(2)
References
31(2)
Semantically-Secured Message-Key Trade-Off over Wiretap Channels with Random Parameters
33(16)
Alexander Bunin
Ziv Goldfeld
Haim H. Permuter
Shlomo Shamai (Shitz)
Paul Cuff
Pablo Piantanida
1 Introduction
34(3)
2 Preliminaries
37(1)
3 SM-SK Trade-Off over Wiretap Channels with Non-Causal Encoder CSI
38(4)
4 Past Results as Special Cases
42(3)
5 Outline of Proof of Theorem 1
45(1)
6 Summary and Concluding Remarks
46(3)
References
47(2)
Hash-then-Encode: A Modular Semantically Secure Wiretap Code
49(16)
Setareh Sharifian
Fuchun Lin
Reihaneh Safavi-Naini
1 Introduction
49(4)
2 Preliminary
53(2)
3 A Modular Construction of Efficiently Invertible UHFs (ei-UHF)
55(2)
4 HtE (Hash-then-Encode) Construction
57(4)
5 Concluding Remarks
61(4)
Appendix
62(1)
References
63(2)
A CCA-Secure Cryptosystem Using Massive MIMO Channels
65(14)
Thomas Dean
Andrea Goldsmith
1 Introduction
65(2)
2 System Model
67(2)
3 Main Theorem
69(2)
4 A CCA-Secure Cryptosystem
71(4)
5 Conclusion
75(4)
References
76(3)
You Are How You Play: Authenticating Mobile Users via Game Playing
79(18)
Riccardo Spolaor
Merylin Monaro
Pasquale Capuozzo
Marco Baesso
Mauro Conti
Luciano Gamberini
Giuseppe Sartori
1 Introduction
80(1)
2 Related Work
81(2)
3 Methods
83(5)
4 Experimental Results
88(4)
5 Conclusions
92(5)
References
94(3)
Fuzzy Authentication Using Rank Distance
97(12)
Alessandro Neri
Joachim Rosenthal
Davide Schipani
1 Introduction
97(1)
2 Rank Metric Codes and Linearized Polynomials
98(2)
3 Fuzzy Commitment Scheme with the Rank Distance
100(1)
4 A Linearized Polynomial Fuzzy Vault Scheme
101(6)
5 Applications
107(2)
References
108(1)
A McEliece-Based Key Exchange Protocol for Optical Communication Systems
109(16)
Joo Yeon Cho
Helmut Griesser
Danish Rafique
1 Introduction
109(2)
2 Background
111(2)
3 System Model
113(1)
4 A Proposed Key Exchange Protocol
113(2)
5 Security Analysis
115(3)
6 Implementation
118(2)
7 Conclusion
120(5)
Appendix
120(1)
References
121(4)
An ICN-Based Authentication Protocol for a Simplified LTE Architecture
125(16)
Alberto Compagno
Mauro Conti
Muhammad Hassan
1 Introduction
125(2)
2 ICN Overview
127(1)
3 Authentication and Mobile Management in LTE
127(3)
4 Simplified LTE Architecture for ICN
130(5)
5 Evaluation
135(3)
6 Security Discussion
138(1)
7 Conclusion
139(2)
References
139(2)
Author Index 141