Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Secrecy, Covertness and Authentication in Wireless Communications, Shen


Варианты приобретения
Цена: 167700.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 127 шт.  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Shen
Название:  Secrecy, Covertness and Authentication in Wireless Communications
ISBN: 9783031384646
Издательство: Springer
Классификация:

ISBN-10: 3031384644
Обложка/Формат: Hardback
Вес: 0.00 кг.
Дата издания: 31.10.2023
Язык: English
Основная тема: Computer Science
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities. When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques. This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.
Дополнительное описание: Chapter 1 Introduction.- Chapter 2 Physical Layer Secure Communications.- Chapter 3 Physical Layer Covert Communications.- Chapter 4 Physical Layer Authentication.- Chapter 5 Secure Routing.- Chapter 6 Summary.


Multimedia Encryption and Authentication Techniques and Applications

Автор: Furht, Borko , Kirovski, Darko
Название: Multimedia Encryption and Authentication Techniques and Applications
ISBN: 0367453630 ISBN-13(EAN): 9780367453633
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Providing a comprehensive reference on advanced topics in the field, this book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprin

Secrecy, Covertness and Authentication in Wireless Communications

Автор: Shen
Название: Secrecy, Covertness and Authentication in Wireless Communications
ISBN: 3031384652 ISBN-13(EAN): 9783031384653
Издательство: Springer
Рейтинг:
Цена: 167700.00 T
Наличие на складе: Поставка под заказ.

Multimedia Encryption and Authentication Techniques and Applications

Название: Multimedia Encryption and Authentication Techniques and Applications
ISBN: 0849372127 ISBN-13(EAN): 9780849372124
Издательство: Taylor&Francis
Рейтинг:
Цена: 132710.00 T
Наличие на складе: Нет в наличии.

Authentication in IoT

Автор: Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mi
Название: Authentication in IoT
ISBN: 1119527929 ISBN-13(EAN): 9781119527923
Издательство: Wiley
Рейтинг:
Цена: 110830.00 T
Наличие на складе: Невозможна поставка.
Описание:

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:

  • Offers an authoritative reference designed for use by all IoT stakeholders
  • Includes information for securing devices at the user, device, and network levels
  • Contains a classification of existing vulnerabilities
  • Written by an international group of experts on the topic
  • Provides a guide to the most current information available on IoT security

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.


Noise Tolerant Data Authentication for Wireless Communication

Автор: Ur-Rehman
Название: Noise Tolerant Data Authentication for Wireless Communication
ISBN: 3319789414 ISBN-13(EAN): 9783319789415
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Chapter1: Introduction and the Need for Noise Tolerant Data Authentication.- Chapter2: Wireless Communications.- Chapter3: Noise Tolerant Data Authentication Mechanisms.- Chapter4: Digital Watermarking Techniques.- Chapter5: Dual Watermarking with Error Correction.- Chapter6: Enhanced Decoding based on Authenticating the Region of Interests.- Chapter7: Authentication with Block Level Error Localization.


The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and M

Автор: Tijms Arjan, Bais Teo, Keil Werner
Название: The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and M
ISBN: 1484279441 ISBN-13(EAN): 9781484279441
Издательство: Springer
Рейтинг:
Цена: 60550.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Refer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security implementations are discussed, such as Soteria and Open Liberty, along with the build-in modules and Jakarta EE Security third-party modules, such as Payara Yubikey & OIDC, and OmniFaces JWT-Auth. The book discusses Jakarta EE Security in relation to SE underpinnings and provides a detailed explanation of how client-cert authentication over HTTPS takes place, how certifications work, and how LDAP-like names are mapped to caller/user names. General (web) security best practices are presented, such as not storing passwords in plaintext, using HTTPS, sanitizing inputs to DB queries, encoding output, and explanations of various (web) attacks and common vulnerabilities are included. Practical examples of securing applications discuss common needs such as letting users explicitly log in, sign up, verify email safely, explicitly log in to access protected pages, and go direct to the log in page. Common issues are covered such as abandoning an authentication dialog halfway and later accessing protected pages again. What You Will Learn * Know what Jakarta/Java EE security includes and how to get started learning and using this technology for today's and tomorrow's enterprise Java applications * Secure applications: traditional server-side web apps built with JSF (Faces) as well as applications based on client-side frameworks (such as Angular) and JAX-RS * Work with the daunting number of security APIs in Jakarta EE * Understand how EE security evolved Who This Book Is For Java developers using Jakarta EE and writing applications that need to be secured (every application). Basic knowledge of Servlets and CDI is assumed. Library writers and component providers who wish to provide additional authentication mechanisms for Jakarta EE also will find the book useful.

Emerging Technologies for Authorization and Authentication: Third International Workshop, Etaa 2020, Guildford, Uk, September 18, 2020, Proceedings

Автор: Saracino Andrea, Mori Paolo
Название: Emerging Technologies for Authorization and Authentication: Third International Workshop, Etaa 2020, Guildford, Uk, September 18, 2020, Proceedings
ISBN: 3030644545 ISBN-13(EAN): 9783030644543
Издательство: Springer
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020.

WiFi signal-based user authentication

Автор: Yu
Название: WiFi signal-based user authentication
ISBN: 9819959136 ISBN-13(EAN): 9789819959136
Издательство: Springer
Рейтинг:
Цена: 37260.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.

Reversible Steganography and Authentication Via Transform Encoding

Автор: Mandal Jyotsna Kumar
Название: Reversible Steganography and Authentication Via Transform Encoding
ISBN: 9811543968 ISBN-13(EAN): 9789811543968
Издательство: Springer
Рейтинг:
Цена: 149060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.

Access Control, Authentication, and Public Key Infrastructur

Автор: Chapple Mike
Название: Access Control, Authentication, and Public Key Infrastructur
ISBN: 1284031594 ISBN-13(EAN): 9781284031591
Издательство: Jones & Bartlett
Рейтинг:
Цена: 128060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

Series meets all standards put forth by CNSS 4011 & 4013A

Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work as well as testing and managing them.

New to the Second Edition:

Updated references to Windows 8 and Outlook 2011
A new discussion of recent Chinese hacking incidence
Examples depicting the risks associated with a missing unencrypted laptop containing private data.
New sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added.
New information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA).

Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019,

Автор: Saracino Andrea, Mori Paolo
Название: Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019,
ISBN: 3030397483 ISBN-13(EAN): 9783030397487
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Logics to reason formally about trust computation and manipulation.- An Authorization framework for Cooperate Intelligent Transport Systems.- A Framework for the Validation of Access Control Systems.- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC).- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics.- Collaborative Authentication using Threshold Cryptography.- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices.- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.


Emerging Technologies for Authorization and Authentication: 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Select

Автор: Saracino Andrea, Mori Paolo
Название: Emerging Technologies for Authorization and Authentication: 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Select
ISBN: 3030937461 ISBN-13(EAN): 9783030937461
Издательство: Springer
Рейтинг:
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия