|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-981-10-1575-5 |
003 |
DE-He213 |
005 |
20220422164525.0 |
007 |
cr nn 008mamaa |
008 |
161004s2016 si | s |||| 0|eng d |
020 |
|
|
|a 9789811015755
|9 978-981-10-1575-5
|
024 |
7 |
|
|a 10.1007/978-981-10-1575-5
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a Wang, Hui-Ming.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Physical Layer Security in Random Cellular Networks
|h [electronic resource] /
|c by Hui-Ming Wang, Tong-Xing Zheng.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Singapore :
|b Springer Nature Singapore :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XVIII, 113 p. 37 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
505 |
0 |
|
|a 1 Wireless physical layer security -- 2 Random network and stochastic geometry -- 3 Physical layer security in cellular network under TDMA -- 4 Physical layer security in heterogeneous cellular network -- 5 Physical layer security in heterogeneous ad hoc network with full-duplex transceivers -- 6 Conclusions and future research directions.
|
520 |
|
|
|a This book investigates key security issues in connection with the physical layer for random wireless cellular networks. It first introduces readers to the fundamentals of information theoretic security in the physical layer. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks. It subsequently elaborates on physical-layer security in multi-tier heterogeneous networks. With the new modeled settings, the authors also verify the security performance with the impact of the full-duplex transceivers. The specific model design presented here offers a valuable point of reference for readers in related areas. In addition, the book highlights promising topics and proposes potential future research directions.
|
650 |
|
0 |
|a Computer networks .
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Zheng, Tong-Xing.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811015748
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811015762
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-981-10-1575-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|