Physical Layer Security in Wireless Cooperative Networks (Record no. 80690)

000 -LEADER
fixed length control field 03417nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-319-61863-0
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801222350.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170831s2018 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319618630
-- 978-3-319-61863-0
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Wang, Li.
245 10 - TITLE STATEMENT
Title Physical Layer Security in Wireless Cooperative Networks
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2018.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVII, 181 p. 10 illus., 3 illus. in color.
490 1# - SERIES STATEMENT
Series statement Wireless Networks,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 1 Introduction -- 2 Existing Techniques in Physical Layer Security -- 3 Secrecy Analysis with Time-Reversal Technique in Distributed Transmission System -- 4 Spatial Modulation in Physical Layer Security -- 5 Cooperative Security in D2D Communications -- 6 Summary.
520 ## - SUMMARY, ETC.
Summary, etc This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-61863-0
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2018.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks .
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2366-1445
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.