Description |
1 online resource (xxi, 558 pages) : illustrations |
Contents |
Effective security: reliability, confusion, and stealth / J. Hou, G. Kramer, and M. Bloch -- Error-free perfect secrecy systems / S.-W. Ho, T. Chan, A. Grant, and C. Uduwerelle -- Secure source coding / P. Cuff and C. Schieler -- Networked secure source coding / K. Kittichokechai, T.J. Oechtering, and M. Skoglund -- Secrecy rate maximization in Gaussian MIMO wiretap channels / S. Loyka and C.D. Charalambous -- MIMO wiretap channels / M. Nafea and A. Yener -- MISO wiretap channel with strictly causal CSI: a topological viewpoint / Z.H. Awan and A. Sezgin -- Physical-layer security with delayed, hybrid, and alternating channel state knowledge / P. Mukherjee, R. Tandon, and S. Ulukus -- Stochastic orders, alignments, and ergodic secrecy capacity / P.-H. Lin and E.A. Jorswieck -- The discrete memoryless arbitrarily varying wiretap channel / J. Nötzel, M. Wiese, and H. Boche -- Super-activation as a unique feature of secure communication over arbitrarily varying channels / R.F. Schaefer, H. Boche, and H.V. Poor -- Multiple secret key generation: information theoretic models and key capacity regions / H. Zhang, Y. Liang, L. Lai, and S. Shamai (Shitz) -- Secret key generation for physical unclonable functions / M. Pehl, M. Hiller, and G. Sigl -- Wireless physical-layer authentication for the internet of things / G. Caparra et al. -- Information theoretic analysis of the performance of biometric authentication systems / T. Ignatenko and F.M.J. Willems -- Joint privacy and security of multiple biometric systems / A. Goldberg and S.C. Draper -- Information theoretic approaches to privacy-preserving information access and dissemination / G. Fanti and K. Ramchandran -- Privacy in the smart grid: information, control, and games / H.V. Poor -- Security in distributed storage systems / S. El Rouayheb, S. Goparaju, and K. Ramchandran |
Summary |
Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways of addressing issues of data security, embedded security, privacy, and authentication in modern information systems. A wide range of wireless and cyber-physical systems is considered, including 5G cellular networks, the Tactile Internet, biometric identification systems, online data repositories, and smart electricity grids. This is an invaluable guide for both researchers and graduate students working in communications engineering, and industry practitioners and regulators interested in improving security in the next generation of information systems |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Telecommunication systems -- Security measures
|
|
Privacy.
|
|
Privacy
|
|
Telecommunication systems -- Security measures
|
Form |
Electronic book
|
Author |
Schaefer, Rafael F., 1982- editor.
|
|
Boche, Holger, editor
|
|
Khisti, Ashish, 1979- editor.
|
|
Poor, H. Vincent, editor
|
LC no. |
2017004136 |
ISBN |
9781316450840 |
|
1316450848 |
|
1108206689 |
|
9781108206686 |
|
1108216137 |
|
9781108216135 |
|