LEADER 04214nam 22006495 450 001 9910349501703321 005 20230810165416.0 010 $a3-030-27565-5 024 7 $a10.1007/978-3-030-27565-5 035 $a(CKB)4100000009273680 035 $a(DE-He213)978-3-030-27565-5 035 $a(MiAaPQ)EBC5922824 035 $a(PPN)269147128 035 $a(EXLCZ)994100000009273680 100 $a20190914d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPhysical-Layer Security and Quantum Key Distribution /$fby Ivan B. Djordjevic 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XV, 472 p. 221 illus., 190 illus. in color.) 311 $a3-030-27564-7 327 $aIntroduction -- Information theory fundamentals -- Conventional cryptography fundamentals -- Physical-layer security (PLS) -- Quantum information theory and quantum information processing fundamentals -- Quantum key distribution -- Discrete-variable (DV) QKD -- Continuous-variable (CV) QKD -- Measurement-device-independent (MDI) -- Covert/stealth/low-probability of detection classical and quantum communications -- Cyber security, PLS, and QKD relationship -- Conclusion. 330 $aThis textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material. Integrates modern cryptography, physical-layer security, QKD, covert communication, and cyber security technologies and shows students how they can work together to solve issues Does not require prior knowledge in corresponding fields or prerequisite material except basic concepts on vector algebra at undergraduate level. Can be used in multiple courses, such as modern cryptography, physical-layer security, QKD, or a combination of these. 606 $aSpintronics 606 $aTelecommunication 606 $aEngineering mathematics 606 $aEngineering$xData processing 606 $aComputer networks 606 $aSpintronics 606 $aCommunications Engineering, Networks 606 $aMathematical and Computational Engineering Applications 606 $aMicrowaves, RF Engineering and Optical Communications 606 $aComputer Communication Networks 615 0$aSpintronics. 615 0$aTelecommunication. 615 0$aEngineering mathematics. 615 0$aEngineering$xData processing. 615 0$aComputer networks. 615 14$aSpintronics. 615 24$aCommunications Engineering, Networks. 615 24$aMathematical and Computational Engineering Applications. 615 24$aMicrowaves, RF Engineering and Optical Communications. 615 24$aComputer Communication Networks. 676 $a005.8 676 $a005.8 700 $aDjordjevic$b Ivan B$4aut$4http://id.loc.gov/vocabulary/relators/aut$0763019 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349501703321 996 $aPhysical-Layer Security and Quantum Key Distribution$92544754 997 $aUNINA