1325 results in Communications, Information Theory and Security
3 - Maritime Transportation System Security and the Use of Game Theory: A Perfect Match to Address Operational and Tactical Concerns
- from PART I - SECURITY EXPERTS' PERSPECTIVES
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 51-64
-
- Chapter
- Export citation
10 - Effective Solutions for Real-World Stackelberg Games: When Agents Must Deal with Human Uncertainties
- from PART IV - FUTURE RESEARCH
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 193-212
-
- Chapter
- Export citation
PART IV - FUTURE RESEARCH
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 191-192
-
- Chapter
- Export citation
2 - Fundamentals of information theory
- from Part I - Preliminaries
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 13-46
-
- Chapter
- Export citation
7 - System aspects
- from Part III - Coding and system aspects
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 247-266
-
- Chapter
- Export citation
Preface
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp xi-xii
-
- Chapter
- Export citation
3 - Secrecy capacity
- from Part II - Information-theoretic security
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 49-111
-
- Chapter
- Export citation
8 - Secrecy and jamming in multi-user channels
- from Part IV - Other applications of information-theoretic security
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 269-292
-
- Chapter
- Export citation
9 - Network-coding security
- from Part IV - Other applications of information-theoretic security
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 293-310
-
- Chapter
- Export citation
5 - Security limits of Gaussian and wireless channels
- from Part II - Information-theoretic security
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 177-212
-
- Chapter
- Export citation
Part III - Coding and system aspects
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 213-214
-
- Chapter
- Export citation
Part II - Information-theoretic security
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 47-48
-
- Chapter
- Export citation
6 - Coding for secrecy
- from Part III - Coding and system aspects
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 215-246
-
- Chapter
- Export citation
Subject index
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 326-329
-
- Chapter
- Export citation
Contents
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp vii-x
-
- Chapter
- Export citation
Part IV - Other applications of information-theoretic security
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 267-268
-
- Chapter
- Export citation
1 - An information-theoretic approach to physical-layer security
- from Part I - Preliminaries
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 3-12
-
- Chapter
- Export citation
References
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 311-322
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp i-vi
-
- Chapter
- Export citation
Physical-Layer Security
- From Information Theory to Security Engineering
-
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011