Atjaunināt sīkdatņu piekrišanu

E-grāmata: Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security

Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 154,06 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
1(14)
Arsenia Chorti
1 Introduction
1(1)
2 Secret Key Generation Systems in the Presence of an Active Adversary
2(2)
3 MiM in SKG Systems: Injection Attacks
4(4)
4 Jamming Attacks
8(4)
5 Conclusions
12(3)
References
13(2)
Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks
15(18)
Stefan Pfennig
Sabrina Engelmann
Elke Franz
Anne Wolf
1 Introduction
15(1)
2 System Model
16(3)
3 Physical Layer Key Generation
19(1)
4 End-to-End Key Establishment
20(11)
5 Conclusion
31(2)
References
31(2)
Semantically-Secured Message-Key Trade-Off over Wiretap Channels with Random Parameters
33(16)
Alexander Bunin
Ziv Goldfeld
Haim H. Permuter
Shlomo Shamai (Shitz)
Paul Cuff
Pablo Piantanida
1 Introduction
34(3)
2 Preliminaries
37(1)
3 SM-SK Trade-Off over Wiretap Channels with Non-Causal Encoder CSI
38(4)
4 Past Results as Special Cases
42(3)
5 Outline of Proof of Theorem 1
45(1)
6 Summary and Concluding Remarks
46(3)
References
47(2)
Hash-then-Encode: A Modular Semantically Secure Wiretap Code
49(16)
Setareh Sharifian
Fuchun Lin
Reihaneh Safavi-Naini
1 Introduction
49(4)
2 Preliminary
53(2)
3 A Modular Construction of Efficiently Invertible UHFs (ei-UHF)
55(2)
4 HtE (Hash-then-Encode) Construction
57(4)
5 Concluding Remarks
61(4)
Appendix
62(1)
References
63(2)
A CCA-Secure Cryptosystem Using Massive MIMO Channels
65(14)
Thomas Dean
Andrea Goldsmith
1 Introduction
65(2)
2 System Model
67(2)
3 Main Theorem
69(2)
4 A CCA-Secure Cryptosystem
71(4)
5 Conclusion
75(4)
References
76(3)
You Are How You Play: Authenticating Mobile Users via Game Playing
79(18)
Riccardo Spolaor
Merylin Monaro
Pasquale Capuozzo
Marco Baesso
Mauro Conti
Luciano Gamberini
Giuseppe Sartori
1 Introduction
80(1)
2 Related Work
81(2)
3 Methods
83(5)
4 Experimental Results
88(4)
5 Conclusions
92(5)
References
94(3)
Fuzzy Authentication Using Rank Distance
97(12)
Alessandro Neri
Joachim Rosenthal
Davide Schipani
1 Introduction
97(1)
2 Rank Metric Codes and Linearized Polynomials
98(2)
3 Fuzzy Commitment Scheme with the Rank Distance
100(1)
4 A Linearized Polynomial Fuzzy Vault Scheme
101(6)
5 Applications
107(2)
References
108(1)
A McEliece-Based Key Exchange Protocol for Optical Communication Systems
109(16)
Joo Yeon Cho
Helmut Griesser
Danish Rafique
1 Introduction
109(2)
2 Background
111(2)
3 System Model
113(1)
4 A Proposed Key Exchange Protocol
113(2)
5 Security Analysis
115(3)
6 Implementation
118(2)
7 Conclusion
120(5)
Appendix
120(1)
References
121(4)
An ICN-Based Authentication Protocol for a Simplified LTE Architecture
125(16)
Alberto Compagno
Mauro Conti
Muhammad Hassan
1 Introduction
125(2)
2 ICN Overview
127(1)
3 Authentication and Mobile Management in LTE
127(3)
4 Simplified LTE Architecture for ICN
130(5)
5 Evaluation
135(3)
6 Security Discussion
138(1)
7 Conclusion
139(2)
References
139(2)
Author Index 141