Zu dieser ISBN ist aktuell kein Angebot verfügbar.
This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
(Keine Angebote verfügbar)
Buch Finden: Kaufgesuch aufgebenSie kennen Autor und Titel des Buches und finden es trotzdem nicht auf ZVAB? Dann geben Sie einen Suchauftrag auf und wir informieren Sie automatisch, sobald das Buch verfügbar ist!
Kaufgesuch aufgeben