[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Limits of reliable communication with low probability of detection on AWGN channels

BA Bash, D Goeckel, D Towsley - IEEE journal on selected …, 2013 - ieeexplore.ieee.org
We present a square root limit on the amount of information transmitted reliably and with low
probability of detection (LPD) over additive white Gaussian noise (AWGN) channels …

Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications

X Li, S Liu, F Wu, S Kumari… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
As the rapid development of 5G and Internet of Things (IoT) techniques, more and more
mobile devices with specific sensing capabilities access to the network and large amounts of …

[图书][B] Network information theory

A El Gamal, YH Kim - 2011 - books.google.com
This comprehensive treatment of network information theory and its applications provides
the first unified coverage of both classical and recent results. With an approach that …

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers

S Kumari, M Karuppiah, AK Das, X Li, F Wu… - The Journal of …, 2018 - Springer
Abstract The Internet of Things (IoT) is now a buzzword for Internet connectivity which
extends to embedded devices, sensors and other objects connected to the Internet. Rapid …

[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

[图书][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography

D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …

[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey

C Camara, P Peris-Lopez, JE Tapiador - Journal of biomedical informatics, 2015 - Elsevier
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …

Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures

A Barenghi, L Breveglieri, I Koren… - Proceedings of the …, 2012 - ieeexplore.ieee.org
Implementations of cryptographic algorithms continue to proliferate in consumer products
due to the increasing demand for secure transmission of confidential information. Although …