Information Theoretic Security and Privacy of Information Systems

 
 
Cambridge University Press
  • erschienen am 21. Juni 2017
 
E-Book | PDF mit Adobe-DRM | Systemvoraussetzungen
978-1-108-21613-5 (ISBN)
 
Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways of addressing issues of data security, embedded security, privacy, and authentication in modern information systems. A wide range of wireless and cyber-physical systems is considered, including 5G cellular networks, the Tactile Internet, biometric identification systems, online data repositories, and smart electricity grids. This is an invaluable guide for both researchers and graduate students working in communications engineering, and industry practitioners and regulators interested in improving security in the next generation of information systems.
  • Englisch
  • Cambridge
  • |
  • Großbritannien
  • Für Beruf und Forschung
Worked examples or Exercises; 9 Tables, black and white; 13 Halftones, black and white; 120 Line drawings, black and white
978-1-108-21613-5 (9781108216135)

weitere Ausgaben werden ermittelt
Rafael F. Schaefer is an Assistant Professor at the Technische Universitat Berlin, having previously worked at Princeton University, New Jersey. Holger Boche is a Full Professor at the Technische Universitat Munchen, a member of the German Academy of Sciences, and a Fellow of the Institute of Electrical and Electronics Engineers. He is also a co-editor of Mechanisms and Games for Dynamic Spectrum Allocation (Cambridge, 2013). Ashish Khisti is an Associate Professor and a Canada Research Chair in the Department of Electrical and Computer Engineering at the University of Toronto. H. Vincent Poor is the Michael Henry Strater University Professor at Princeton University, New Jersey, a member of the US National Academies of Engineering and Sciences, and a Fellow of the Institute of Electrical and Electronics Engineers. He has co-authored and co-edited several books, including Quickest Detection (Cambridge, 2008) and Smart Grid Communications and Networking (Cambridge, 2012).
Part I. Theoretical Foundations: 1. Effective secrecy: reliability, confusion and stealth Jie Hou, Gerhard Kramer and Matthieu Bloch; 2. Error free perfect secrecy systems Siu-Wai Ho, Terence Chan, Alex Grant and Chinthani Uduwerelle; 3. Secure source coding Paul Cuff and Curt Schieler; 4. Networked secure source coding Kittipong Kittichokechai, Tobias J. Oechtering and Mikael Skoglund; Part II. Secure Communication: 5. Secrecy rate Maximization in Gaussian MIMO wiretap channels Sergey Loyka and Charalambos D. Charalambous; 6. MIMO wire-tap channels Mohamed Nafea and Aylin Yener; 7. MISO wiretap channel with strictly causal CSI: a topological viewpoint Zohaib Hassan Awan and Aydin Sezgin; 8. Physical layer security with delayed, hybrid and alternating channel state knowledge Pritam Mukherjee, Ravi Tandon and Sennur Ulukus; 9. Stochastic orders, alignments, and ergodic secrecy capacity Pin-Hsun Lin and Eduard A. Jorswieck; 10. The discrete memoryless arbitrarily varying wiretap channel Janis Notzel, Moritz Wiese and Holger Boche; 11. Super-activation as a unique feature of secure communication over arbitrarily varying channels Rafael F. Schaefer, Holger Boche and H. Vincent Poor; Part III. Secret Key Generation and Authentication: 12. Multiple secret key generation: information theoretic models and key capacity regions Huishuai Zhang, Yingbin Liang, Lifeng Lai and Shlomo Shamai (Shitz); 13. Secret key generation for physical unclonable functions Michael Pehl, Matthias Hiller and Georg Sigl; 14. Wireless physical layer authentication for the Internet of Things Gianluca Caparra, Marco Centenaro, Nicola Laurenti, Stefano Tomasin and Lorenzo Vangelista; Part IV. Data Systems and Related Applications: 15. Information theoretic analysis of the performance of biometric authentication systems Tanya Ignatenko and Frans M. J. Willems; 16. Joint privacy and security of multiple biometric systems Adina Goldberg and Stark C. Draper; 17. Information-theoretic approaches to privacy-preserving information access and dissemination Giulia Fanti and Kannan Ramchandran; 18. Privacy in the smart grid: information, control and games H. Vincent Poor; 19. Security in distributed storage systems Salim El Rouayheb, Sreechakra Goparaju and Kannan Ramchandran.

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Als Download verfügbar

121,99 €
inkl. 7% MwSt.
E-Book Einzellizenz
PDF mit Adobe-DRM
siehe Systemvoraussetzungen
E-Book bestellen