Proceedings of the 2nd Workshop on Communication Security

Proceedings of the 2nd Workshop on Communication Security

Cryptography and Physical Layer Security

Baldi, Marco; Quaglia, Elizabeth A.; Tomasin, Stefano

Springer International Publishing AG

08/2018

141

Mole

Inglês

9783319865843

15 a 20 dias

454

Descrição não disponível.
?A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems.- Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks.- Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters.- Hash-then-Encode: A ModularSemantically Secure Wiretap Code.- A CCA-Secure Cryptosystem Using Massive MIMO Channels.- You Are How You Play: Authenticating Mobile Users via Game Playing.- Fuzzy Authentication using Rank Distance.- A McEliece-based Key Exchange Protocol for Optical Communication Systems.- An ICN-based Authentication Protocol for a Simplified LTE Architecture.
Worskhop on Communication Security 2017;WCS 2017;EUROCRYPT 2017;Cross-layer Security;Unconditional Security;Computational Security;Communication Systems;Cryptography;Secure Wireless Communications;Semantic Security;Wiretap Channels;algorithm analysis and problem complexity