找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Secrecy, Covertness and Authentication in Wireless Communications; Physical Layer Secur Yulong Shen,Yuanyu Zhang,Xiaohong Jiang Book 2023 T

[复制链接]
查看: 33511|回复: 35
发表于 2025-3-21 16:54:17 | 显示全部楼层 |阅读模式
书目名称Secrecy, Covertness and Authentication in Wireless Communications
副标题Physical Layer Secur
编辑Yulong Shen,Yuanyu Zhang,Xiaohong Jiang
视频videohttp://file.papertrans.cn/864/863221/863221.mp4
概述Covers a wider range of security aspects in wireless communication.Discusses practical challenges faced today like the techniques of physical layer secure communication.Provides potential applications
丛书名称Wireless Networks
图书封面Titlebook: Secrecy, Covertness and Authentication in Wireless Communications; Physical Layer Secur Yulong Shen,Yuanyu Zhang,Xiaohong Jiang Book 2023 T
描述.This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities. .When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming.  Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems
出版日期Book 2023
关键词Wireless Networks; Wireless Communications; Physical layer security; Secrecy; Secure Communication; Cover
版次1
doihttps://doi.org/10.1007/978-3-031-38465-3
isbn_softcover978-3-031-38467-7
isbn_ebook978-3-031-38465-3Series ISSN 2366-1186 Series E-ISSN 2366-1445
issn_series 2366-1186
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

书目名称Secrecy, Covertness and Authentication in Wireless Communications影响因子(影响力)




书目名称Secrecy, Covertness and Authentication in Wireless Communications影响因子(影响力)学科排名




书目名称Secrecy, Covertness and Authentication in Wireless Communications网络公开度




书目名称Secrecy, Covertness and Authentication in Wireless Communications网络公开度学科排名




书目名称Secrecy, Covertness and Authentication in Wireless Communications被引频次




书目名称Secrecy, Covertness and Authentication in Wireless Communications被引频次学科排名




书目名称Secrecy, Covertness and Authentication in Wireless Communications年度引用




书目名称Secrecy, Covertness and Authentication in Wireless Communications年度引用学科排名




书目名称Secrecy, Covertness and Authentication in Wireless Communications读者反馈




书目名称Secrecy, Covertness and Authentication in Wireless Communications读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:04:46 | 显示全部楼层
Secure Routing,the route (path) for end-to-end data delivery. However, the PLS-oriented routing design for multi-hop wireless communication systems still remains largely uninvestigated and needs to be addressed carefully. This chapter introduces the PLS-based secure routing design. In Sect. 5.1, we present a secur
发表于 2025-3-22 01:22:01 | 显示全部楼层
Book 2023vertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems
发表于 2025-3-22 06:22:45 | 显示全部楼层
发表于 2025-3-22 08:46:16 | 显示全部楼层
Yulong Shen,Yuanyu Zhang,Xiaohong Jiangre applied to the images in order to enhance image qualities. After that, the corrosion part is detected and the percentage of the corrosion area in the entire image is measured. The proposed system has the potential to be implemented for the autonomous correction detection with the image enhancemen
发表于 2025-3-22 14:20:37 | 显示全部楼层
Yulong Shen,Yuanyu Zhang,Xiaohong Jiangf the formation of life. In addition to the planned missions to Mars and Europa, there are extensive efforts to search for life outside the solar system. Rapid advances in the detection of extrasolar planets, outlined in Chap. 3, are expected to lead to the discovery of Earth-like planets in the nea
发表于 2025-3-22 20:43:40 | 显示全部楼层
发表于 2025-3-22 22:02:08 | 显示全部楼层
发表于 2025-3-23 04:44:34 | 显示全部楼层
Yulong Shen,Yuanyu Zhang,Xiaohong Jiangf the formation of life. In addition to the planned missions to Mars and Europa, there are extensive efforts to search for life outside the solar system. Rapid advances in the detection of extrasolar planets, outlined in Chap. 3, are expected to lead to the discovery of Earth-like planets in the nea
发表于 2025-3-23 09:21:32 | 显示全部楼层
Yulong Shen,Yuanyu Zhang,Xiaohong Jiang the stage on which life made its appearance. Another way to learn about planets is to conduct detailed search programs, which recently have become very successful, although they have not yet found an Earth-like planet. These planet search methods are discussed in Chap. 3 and the question of what co
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-9 21:59
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表