000 | 03756nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-61863-0 | ||
003 | DE-He213 | ||
005 | 20210201191533.0 | ||
007 | cr nn 008mamaa | ||
008 | 170831s2018 gw | s |||| 0|eng d | ||
020 |
_a9783319618630 _9978-3-319-61863-0 |
||
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aWang, Li. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aPhysical Layer Security in Wireless Cooperative Networks _h[electronic resource] / _cby Li Wang. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXVII, 181 p. 10 illus., 3 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aWireless Networks, _x2366-1186 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _a1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary. | |
520 | _aThis book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text. | ||
541 |
_fUABC ; _cTemporal ; _d01/01/2021-12/31/2023. |
||
650 | 0 | _aElectrical engineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer communication systems. | |
650 | 1 | 4 |
_aCommunications Engineering, Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/T24035 |
650 | 2 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aComputer Communication Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/I13022 |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319618623 |
776 | 0 | 8 |
_iPrinted edition: _z9783319618647 |
776 | 0 | 8 |
_iPrinted edition: _z9783319871790 |
830 | 0 |
_aWireless Networks, _x2366-1186 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-61863-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c244611 _d244610 |