Physical Layer Security in Wireless Cooperative Networks (Record no. 80690)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03417nam a22005415i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-61863-0 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801222350.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170831s2018 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319618630 |
-- | 978-3-319-61863-0 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.382 |
100 1# - AUTHOR NAME | |
Author | Wang, Li. |
245 10 - TITLE STATEMENT | |
Title | Physical Layer Security in Wireless Cooperative Networks |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2018. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVII, 181 p. 10 illus., 3 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Wireless Networks, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | 1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-319-61863-0 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2018. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Telecommunication. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2366-1445 |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.