語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Physical-layer security and quantum ...
~
Djordjevic, Ivan B.
FindBook
Google Book
Amazon
博客來
Physical-layer security and quantum key distribution
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Physical-layer security and quantum key distribution/ by Ivan B. Djordjevic.
作者:
Djordjevic, Ivan B.
出版者:
Cham :Springer International Publishing : : 2019.,
面頁冊數:
xv, 472 p. :ill. (some col.), digital ;24 cm.
內容註:
Introduction -- Information theory fundamentals -- Conventional cryptography fundamentals -- Physical-layer security (PLS) -- Quantum information theory and quantum information processing fundamentals -- Quantum key distribution -- Discrete-variable (DV) QKD -- Continuous-variable (CV) QKD -- Measurement-device-independent (MDI) -- Covert/stealth/low-probability of detection classical and quantum communications -- Cyber security, PLS, and QKD relationship -- Conclusion.
Contained By:
Springer eBooks
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-030-27565-5
ISBN:
9783030275655
Physical-layer security and quantum key distribution
Djordjevic, Ivan B.
Physical-layer security and quantum key distribution
[electronic resource] /by Ivan B. Djordjevic. - Cham :Springer International Publishing :2019. - xv, 472 p. :ill. (some col.), digital ;24 cm.
Introduction -- Information theory fundamentals -- Conventional cryptography fundamentals -- Physical-layer security (PLS) -- Quantum information theory and quantum information processing fundamentals -- Quantum key distribution -- Discrete-variable (DV) QKD -- Continuous-variable (CV) QKD -- Measurement-device-independent (MDI) -- Covert/stealth/low-probability of detection classical and quantum communications -- Cyber security, PLS, and QKD relationship -- Conclusion.
This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material. Integrates modern cryptography, physical-layer security, QKD, covert communication, and cyber security technologies and shows students how they can work together to solve issues Does not require prior knowledge in corresponding fields or prerequisite material except basic concepts on vector algebra at undergraduate level. Can be used in multiple courses, such as modern cryptography, physical-layer security, QKD, or a combination of these.
ISBN: 9783030275655
Standard No.: 10.1007/978-3-030-27565-5doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .D567 2019
Dewey Class. No.: 005.8
Physical-layer security and quantum key distribution
LDR
:03032nmm a2200325 a 4500
001
2193371
003
DE-He213
005
20191224111612.0
006
m d
007
cr nn 008maaau
008
200514s2019 gw s 0 eng d
020
$a
9783030275655
$q
(electronic bk.)
020
$a
9783030275648
$q
(paper)
024
7
$a
10.1007/978-3-030-27565-5
$2
doi
035
$a
978-3-030-27565-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.D567 2019
072
7
$a
PHQ
$2
bicssc
072
7
$a
COM032000
$2
bisacsh
072
7
$a
PHQ
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.D626 2019
100
1
$a
Djordjevic, Ivan B.
$3
2179934
245
1 0
$a
Physical-layer security and quantum key distribution
$h
[electronic resource] /
$c
by Ivan B. Djordjevic.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xv, 472 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Introduction -- Information theory fundamentals -- Conventional cryptography fundamentals -- Physical-layer security (PLS) -- Quantum information theory and quantum information processing fundamentals -- Quantum key distribution -- Discrete-variable (DV) QKD -- Continuous-variable (CV) QKD -- Measurement-device-independent (MDI) -- Covert/stealth/low-probability of detection classical and quantum communications -- Cyber security, PLS, and QKD relationship -- Conclusion.
520
$a
This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material. Integrates modern cryptography, physical-layer security, QKD, covert communication, and cyber security technologies and shows students how they can work together to solve issues Does not require prior knowledge in corresponding fields or prerequisite material except basic concepts on vector algebra at undergraduate level. Can be used in multiple courses, such as modern cryptography, physical-layer security, QKD, or a combination of these.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Cryptography.
$3
532586
650
1 4
$a
Quantum Information Technology, Spintronics.
$3
1067172
650
2 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Mathematical and Computational Engineering.
$3
3226306
650
2 4
$a
Microwaves, RF and Optical Engineering.
$3
893985
650
2 4
$a
Computer Communication Networks.
$3
775497
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-27565-5
950
$a
Physics and Astronomy (Springer-11651)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9375661
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .D567 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入