|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1011222244 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
171111s2017 enka ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d UAB
|d ITD
|d UIU
|d CDN
|d IDEBK
|d OCLCO
|d MERUC
|d OCLCF
|d N$T
|d KNOVL
|d YDX
|d STF
|d EZ9
|d OTZ
|d OCLCQ
|d WYU
|d LVT
|d G3B
|d IGB
|d CUV
|d UKAHL
|d OCLCQ
|d OCL
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1008972587
|a 1057437076
|a 1097126446
|
020 |
|
|
|a 9781785612367
|q (electronic bk.)
|
020 |
|
|
|a 1785612360
|q (electronic bk.)
|
020 |
|
|
|a 9781523112906
|q (electronic bk.)
|
020 |
|
|
|a 1523112905
|q (electronic bk.)
|
020 |
|
|
|z 9781785612350
|
020 |
|
|
|z 1785612352
|
029 |
1 |
|
|a AU@
|b 000062590915
|
035 |
|
|
|a (OCoLC)1011222244
|z (OCoLC)1008972587
|z (OCoLC)1057437076
|z (OCoLC)1097126446
|
050 |
|
4 |
|a TK5103.2
|
072 |
|
7 |
|a TEC
|x 009070
|2 bisacsh
|
072 |
|
7 |
|a B0100
|2 inspec
|
072 |
|
7 |
|a B6120
|2 inspec
|
072 |
|
7 |
|a B6150C
|2 inspec
|
072 |
|
7 |
|a B6250F
|2 inspec
|
082 |
0 |
4 |
|a 621.382
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Trusted Communications with Physical Layer Security for 5G and Beyond /
|c edited by Trung Q. Duong, Xiangyun Zhou and H. Vincent Poor.
|
264 |
|
1 |
|a London :
|b Institution of Engineering and Technology,
|c 2017.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IET Telecommunications Series ;
|v 76
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Contents -- About the editors -- Preface -- Part I: Fundamentals of physical layer security -- 1. Secrecy metrics for physical layer security over fading channels / Biao He, Vincent K.N. Lau, Xiangyun Zhou, and A. Lee Swindlehurst -- 2. Secure data networks with channel uncertainty / Amal Hyadi, Zouheir Rezki, and Mohamed-Slim Alouini -- 3. Confidential and energy-efficient communications by physical layer security / Alessio Zappone, Pin-Hsun Lin, and Eduard A. Jorswieck -- Part II: Physical layer security for multiple-antenna technologies
|
505 |
8 |
|
|a 4. Antenna selection strategies for wiretap channels / Shihao Yan, Nan Yang, Robert Malaney, and Jinhong Yuan5. Physical layer security for massive MIMO systems / Jun Zhu, Robert Schober, and Vijay K. Bhargava -- 6. Physical layer security for massive MIMO with anti-jamming / Tan Tai Do, Hien Quoc Ngo, and Trung Q. Duong -- 7. Physical layer security for multiuser relay networks / Lisheng Fan and Trung Q. Duong -- 8. Trusted wireless communications with spatial multiplexing / Giovanni Geraci and Jinhong Yuan -- Part III: Physical layer security with emerging 5G technologies
|
505 |
8 |
|
|a 9. Physical layer security for wirelessly powered communication systems / Caijun Zhong and Xiaoming Chen10. Physical layer security for D2D-enabled cellular networks / Chuan Ma, Jianting Yue, Hui Yu, and Xiaoying Gan -- 11. Physical layer security for cognitive radio networks / Van-Dinh Nguyen, Trung Q. Duong, and Oh-Soon Shin -- 12. Physical layer security in mmWave cellular networks / Hui-MingWang -- Part IV: Physical layer security with emerging modulation technologies -- 13. Directional-modulation-enabled physical-layer wireless security / Yuan Ding and Vincent Fusco
|
505 |
8 |
|
|a 14. Secure waveforms for 5G systems / Stefano Tomasin15. Physical layer security in non-orthogonal multiple access / Hui-Ming Wang, Yi Zhang, and Zhiguo Ding -- 16. Physical layer security for MIMOME-OFDM systems: spatial versus temporal artificial noise / Ahmed El Shafie, Zhiguo Ding, and Naofal Al-Dhahir -- Part V: Applications of physical layer security -- 17. Physical layer security for real-world applications: use cases, results and open challenges / Stephan Ludwig, René Guillaume, and Andreas MÃơller
|
505 |
8 |
|
|a ""18. Key generation from wireless channels: a survey and practical implementation / Junqing Zhang, Trung Q. Duong, RogerWoods, and Alan Marshall""""19. Application cases of secret key generation in communication nodes and terminals / Christiane Kameni Ngassa, Taghrid Mazloum, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Renaud MoliÃr̈e, Alain Sibille, Adrian Kotelba, and Jani Suomalainen""
|
505 |
8 |
|
|a ""20. Application cases of secrecy coding in communication nodes and terminals / Christiane Kameni Ngassa, Cong Ling, FranÃois Delaveau, Sandrine Boumard, Nir Shapira, Ling Liu, Renaud MoliÃr̈e, Adrian Kotelba, and Jani Suomalainen""
|
520 |
|
|
|a Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
650 |
|
6 |
|a Transmission sans fil
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Mechanical.
|2 bisacsh
|
650 |
|
7 |
|a Wireless communication systems
|x Security measures
|2 fast
|
650 |
|
7 |
|a Electronic security systems
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
650 |
|
7 |
|a 5G mobile communication.
|2 inspect
|
650 |
|
7 |
|a cellular radio.
|2 inspect
|
650 |
|
7 |
|a cognitive radio.
|2 inspect
|
650 |
|
7 |
|a fading channels.
|2 inspect
|
650 |
|
7 |
|a MIMO communication.
|2 inspect
|
650 |
|
7 |
|a OFDM modulation.
|2 inspect
|
650 |
|
7 |
|a relay networks (telecommunication)
|2 inspect
|
650 |
|
7 |
|a space division multiplexing.
|2 inspect
|
650 |
|
7 |
|a telecommunication security.
|2 inspect
|
700 |
1 |
|
|a Duong, Trung Q.,
|e editor.
|
700 |
1 |
|
|a Zhou, Xiangyun,
|e editor.
|
700 |
1 |
|
|a Poor, H. Vincent,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Trusted communications with physical layer security for 5G and beyond.
|d London, United Kingdom : The Institution of Engineering and Technology, 2017
|z 9781785612350
|w (DLC) 2018300258
|w (OCoLC)988170893
|
830 |
|
0 |
|a IET telecommunications series ;
|v 76.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpTCPLSGB2/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32766467
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5123269
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1623763
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis38113951
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14951113
|
994 |
|
|
|a 92
|b IZTAP
|