Securing Wireless Communications at the Physical Layer (Registro nro. 199205)

MARC details
000 -LÍDER
fixed length control field 04566nam a22004695i 4500
001 - NÚMERO DE CONTROL
control field u371325
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
control field SIRSI
005 - FECHA Y HORA DE LA ULTIMA TRANSACCIÓN
control field 20160812080122.0
007 - CAMPO FIJO DE DESCRIPCIÓN FIJA--INFORMACIÓN GENERAL
fixed length control field cr nn 008mamaa
008 - ELEMENTOS DE LONGITUD FIJA -- INFORMACIÓN GENERAL
fixed length control field 100301s2010 xxu| s |||| 0|eng d
020 ## - NÚMERO INTERNACIONAL NORMALIZADO PARA LIBROS
International Standard Book Number 9781441913852
-- 978-1-4419-1385-2
040 ## - FUENTE DE CATALOGACIÓN
Transcribing agency MX-MeUAM
050 #4 - SIGNATURA TOPOGRÁFICA DE LA BIBLIOTECA DEL CONGRESO
Classification number TK1-9971
082 04 - NÚMERO DE CLASIFICACIÓN DECIMAL DEWEY
Classification number 621.382
Edition number 23
100 1# - ASIENTO PRINCIPAL--NOMBRE PERSONAL
Personal name Liu, Ruoheng.
Relator term editor.
245 10 - MENCIÓN DE TITULO
Title Securing Wireless Communications at the Physical Layer
Medium [recurso electrónico] /
Statement of responsibility, etc. edited by Ruoheng Liu, Wade Trappe.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boston, MA :
Name of producer, publisher, distributor, manufacturer Springer US,
Date of production, publication, distribution, manufacture, or copyright notice 2010.
300 ## - DESCRIPCIÓN FÍSICA
Extent XVI, 396 p.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
505 0# - NOTA DE CONTENIDO
Formatted contents note Secrecy Capacity of Independent Parallel Channels -- Obtaining Secrecy through Intentional Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative Jamming: The Tale of Friendly Interference for Secrecy -- Hybrid-ARQ Schemes for Reliable and Secret Wireless Communications -- Secret Communication Under Channel Uncertainty -- Cooperative Secrecy in Wireless Communications -- Source Coding under Secrecy Constraints -- Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels -- Secret Key Generation Among Multiple Terminals with Applications to Wireless Systems -- Secret Key Agreement Techniques based on Multipath Propagation Characteristics -- Secret Communication over Fading Channels -- Fingerprints in the Ether: Channel-Based Authentication -- Message Authentication: Information Theoretic Bounds -- Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement -- Modulation Forensics for Wireless Digital Communications in Frequency-Selective Fading Channels.
520 ## - NOTA DE RESUMEN, ETC.
Summary, etc. Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.
596 ## -
-- 19
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Engineering.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data structures (Computer science).
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Telecommunication.
650 14 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Engineering.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Communications Engineering, Networks.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Signal, Image and Speech Processing.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data Structures, Cryptology and Information Theory.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data Encryption.
700 1# - ASIENTO SECUNDARIO - NOMBRE PERSONAL
Personal name Trappe, Wade.
Relator term editor.
710 2# - ASIENTO SECUNDARIO - NOMBRE CORPORATIVO
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9781441913845
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS
Public note Libro electrónico
Uniform Resource Identifier <a href="http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-4419-1385-2">http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-4419-1385-2</a>
942 ## - TIPO DE MATERIAL (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Fuente de clasificación Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Signatura topográfica Código de barras Date last seen Número de copia Tipo de material
    Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica     TK1 -9971 371325-2001 12/08/2016 1 Libro Electrónico

Con tecnología Koha