Security and Privacy for Modern Wireless Communication Systems
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the follow...
Saved in:
Other Authors: | , , , , , , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2023
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_112514 | ||
005 | 20230808 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230808s2023 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-8229-0 | ||
020 | |a 9783036582283 | ||
020 | |a 9783036582290 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-8229-0 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KNTX |2 bicssc | |
072 | 7 | |a UY |2 bicssc | |
100 | 1 | |a Huang, Tao |4 edt | |
700 | 1 | |a Yan, Shihao |4 edt | |
700 | 1 | |a Zhang, Guanglin |4 edt | |
700 | 1 | |a Sun, Li |4 edt | |
700 | 1 | |a Yuen, Tsz Hon |4 edt | |
700 | 1 | |a Park, YoHan |4 edt | |
700 | 1 | |a Lee, Changhoon |4 edt | |
700 | 1 | |a Huang, Tao |4 oth | |
700 | 1 | |a Yan, Shihao |4 oth | |
700 | 1 | |a Zhang, Guanglin |4 oth | |
700 | 1 | |a Sun, Li |4 oth | |
700 | 1 | |a Yuen, Tsz Hon |4 oth | |
700 | 1 | |a Park, YoHan |4 oth | |
700 | 1 | |a Lee, Changhoon |4 oth | |
245 | 1 | 0 | |a Security and Privacy for Modern Wireless Communication Systems |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2023 | ||
300 | |a 1 electronic resource (308 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power-constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node-edge-cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Information technology industries |2 bicssc | |
650 | 7 | |a Computer science |2 bicssc | |
653 | |a propagation trends | ||
653 | |a social networks | ||
653 | |a group features | ||
653 | |a dilated CNN | ||
653 | |a machine learning | ||
653 | |a physical layer security | ||
653 | |a Rice channels | ||
653 | |a wireless communications | ||
653 | |a 6G security | ||
653 | |a sycon | ||
653 | |a cube attack | ||
653 | |a state recovery | ||
653 | |a wireless body area networks | ||
653 | |a authentication | ||
653 | |a biometric | ||
653 | |a physical unclonable function | ||
653 | |a BAN logic | ||
653 | |a RoR model | ||
653 | |a AVISPA | ||
653 | |a 6G wireless communications | ||
653 | |a chi-square | ||
653 | |a cybersecurity | ||
653 | |a intrusion detection system | ||
653 | |a machine learning techniques | ||
653 | |a meta-model | ||
653 | |a stacking ensemble learning | ||
653 | |a voting techniques | ||
653 | |a fault attack | ||
653 | |a error detection | ||
653 | |a code abiding | ||
653 | |a overcost | ||
653 | |a bitslice cipher | ||
653 | |a multiple eavesdroppers | ||
653 | |a full-duplex | ||
653 | |a underground mine | ||
653 | |a amplify-and-forward relay | ||
653 | |a communication system security | ||
653 | |a physical layer | ||
653 | |a wireless communication | ||
653 | |a precoding | ||
653 | |a wire-tap channel | ||
653 | |a blockchain | ||
653 | |a wireless communication network | ||
653 | |a malicious node | ||
653 | |a security protocol | ||
653 | |a intrusion detection | ||
653 | |a in-vehicle communication | ||
653 | |a inter-vehicle communication | ||
653 | |a optical communication | ||
653 | |a security wireless | ||
653 | |a visible light communication | ||
653 | |a wireless optical communication | ||
653 | |a convolutional neural network | ||
653 | |a CNN | ||
653 | |a counterfeit detection | ||
653 | |a device fingerprinting | ||
653 | |a distinct native attribute (DNA) | ||
653 | |a information and communications technology | ||
653 | |a multiple discriminant analysis | ||
653 | |a MDA | ||
653 | |a WirelessHART | ||
653 | |a wireless communications security | ||
653 | |a digital twin | ||
653 | |a Internet of Things | ||
653 | |a healthcare | ||
653 | |a encryption | ||
653 | |a privacy | ||
653 | |a rural | ||
653 | |a LPWAN | ||
653 | |a secure localization | ||
653 | |a positioning | ||
653 | |a distance vector hop | ||
653 | |a DV-Hop | ||
653 | |a security attacks | ||
653 | |a wireless sensor network | ||
653 | |a security | ||
653 | |a steganalysis | ||
653 | |a covert channel | ||
653 | |a steganography | ||
653 | |a undetectability | ||
653 | |a aggregator-based grouping | ||
653 | |a wireless sensor networks | ||
653 | |a encryption and decryption operations | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/7633 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/112514 |7 0 |z DOAB: description of the publication |