[图书][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
Limits of reliable communication with low probability of detection on AWGN channels
We present a square root limit on the amount of information transmitted reliably and with low
probability of detection (LPD) over additive white Gaussian noise (AWGN) channels …
probability of detection (LPD) over additive white Gaussian noise (AWGN) channels …
Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications
As the rapid development of 5G and Internet of Things (IoT) techniques, more and more
mobile devices with specific sensing capabilities access to the network and large amounts of …
mobile devices with specific sensing capabilities access to the network and large amounts of …
[图书][B] Network information theory
A El Gamal, YH Kim - 2011 - books.google.com
This comprehensive treatment of network information theory and its applications provides
the first unified coverage of both classical and recent results. With an approach that …
the first unified coverage of both classical and recent results. With an approach that …
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
Abstract The Internet of Things (IoT) is now a buzzword for Internet connectivity which
extends to embedded devices, sensors and other objects connected to the Internet. Rapid …
extends to embedded devices, sensors and other objects connected to the Internet. Rapid …
[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
[图书][B] Physically unclonable functions: Concept and constructions
R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …
or PUF. Many research results on this topic were published over recent years in a variety of …
An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography
D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …
[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …
due to the increasing demand for secure transmission of confidential information. Although …