Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Secrecy, Covertness and Authentication in Wireless Communications, Shen


Варианты приобретения
Цена: 167700.00T
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Shen
Название:  Secrecy, Covertness and Authentication in Wireless Communications
ISBN: 9783031384653
Издательство: Springer
Классификация:

ISBN-10: 3031384652
Вес: 0.00 кг.
Дата издания: 30.10.2023
Язык: English
Основная тема: Computer Science
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии

Secrecy, Covertness and Authentication in Wireless Communications

Автор: Shen
Название: Secrecy, Covertness and Authentication in Wireless Communications
ISBN: 3031384644 ISBN-13(EAN): 9783031384646
Издательство: Springer
Рейтинг:
Цена: 167700.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities. When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques. This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.

Reversible Steganography and Authentication Via Transform Encoding

Автор: Mandal Jyotsna Kumar
Название: Reversible Steganography and Authentication Via Transform Encoding
ISBN: 9811543968 ISBN-13(EAN): 9789811543968
Издательство: Springer
Рейтинг:
Цена: 149060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.

Access Control, Authentication, and Public Key Infrastructur

Автор: Chapple Mike
Название: Access Control, Authentication, and Public Key Infrastructur
ISBN: 1284031594 ISBN-13(EAN): 9781284031591
Издательство: Jones & Bartlett
Рейтинг:
Цена: 128060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

Series meets all standards put forth by CNSS 4011 & 4013A

Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work as well as testing and managing them.

New to the Second Edition:

Updated references to Windows 8 and Outlook 2011
A new discussion of recent Chinese hacking incidence
Examples depicting the risks associated with a missing unencrypted laptop containing private data.
New sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added.
New information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA).

Reversible Steganography and Authentication Via Transform Encoding

Автор: Mandal Jyotsna Kumar
Название: Reversible Steganography and Authentication Via Transform Encoding
ISBN: 9811543992 ISBN-13(EAN): 9789811543999
Издательство: Springer
Цена: 149060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.

Multimedia Encryption and Authentication Techniques and Applications

Автор: Furht, Borko , Kirovski, Darko
Название: Multimedia Encryption and Authentication Techniques and Applications
ISBN: 0367453630 ISBN-13(EAN): 9780367453633
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Providing a comprehensive reference on advanced topics in the field, this book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprin

Multimedia Encryption and Authentication Techniques and Applications

Название: Multimedia Encryption and Authentication Techniques and Applications
ISBN: 0849372127 ISBN-13(EAN): 9780849372124
Издательство: Taylor&Francis
Рейтинг:
Цена: 132710.00 T
Наличие на складе: Нет в наличии.

Authentication in IoT

Автор: Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mi
Название: Authentication in IoT
ISBN: 1119527929 ISBN-13(EAN): 9781119527923
Издательство: Wiley
Рейтинг:
Цена: 110830.00 T
Наличие на складе: Невозможна поставка.
Описание:

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:

  • Offers an authoritative reference designed for use by all IoT stakeholders
  • Includes information for securing devices at the user, device, and network levels
  • Contains a classification of existing vulnerabilities
  • Written by an international group of experts on the topic
  • Provides a guide to the most current information available on IoT security

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.


Noise Tolerant Data Authentication for Wireless Communication

Автор: Ur-Rehman
Название: Noise Tolerant Data Authentication for Wireless Communication
ISBN: 3319789414 ISBN-13(EAN): 9783319789415
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Chapter1: Introduction and the Need for Noise Tolerant Data Authentication.- Chapter2: Wireless Communications.- Chapter3: Noise Tolerant Data Authentication Mechanisms.- Chapter4: Digital Watermarking Techniques.- Chapter5: Dual Watermarking with Error Correction.- Chapter6: Enhanced Decoding based on Authenticating the Region of Interests.- Chapter7: Authentication with Block Level Error Localization.


Emerging Technologies for Authorization and Authentication

Автор: Saracino
Название: Emerging Technologies for Authorization and Authentication
ISBN: 303125466X ISBN-13(EAN): 9783031254666
Издательство: Springer
Рейтинг:
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022. The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.

Instant Java Password and Authentication Security

Автор: Mayoral Fernando
Название: Instant Java Password and Authentication Security
ISBN: 1849697760 ISBN-13(EAN): 9781849697767
Издательство: Неизвестно
Рейтинг:
Цена: 36770.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019,

Автор: Saracino Andrea, Mori Paolo
Название: Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019,
ISBN: 3030397483 ISBN-13(EAN): 9783030397487
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Logics to reason formally about trust computation and manipulation.- An Authorization framework for Cooperate Intelligent Transport Systems.- A Framework for the Validation of Access Control Systems.- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC).- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics.- Collaborative Authentication using Threshold Cryptography.- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices.- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.


WiFi signal-based user authentication

Автор: Yu
Название: WiFi signal-based user authentication
ISBN: 9819959136 ISBN-13(EAN): 9789819959136
Издательство: Springer
Рейтинг:
Цена: 37260.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия