Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Wireless systems are becoming increasingly pervasive and securing these systems has been challenging, in large part due to the unique properties associated with wireless communications. Securing these networks has traditionally been approached by taking a conventional approach involving cryptographic protocols. Such an approach inherently seeks to secure the wireless network at the link layer and above, and consequently fails to leverage the most unique characteristic of wireless communication: its physical layer. Securing Wireless Communications at the Physical Layer is a compilation of contributions by experts in wireless communications and security, and presents state-of-the-art results that examine the challenge of introducing security at the physical layer of a wireless system. Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validations that have been performed on real wireless systems. The book also covers topics related to ensuring that cooperative wireless communications at the physical layer is trustworthy. Additionally, the emerging area of modulation forensics, whereby a device is able to identify the modulation format being employed by other devices is explored. Securing Wireless Communications at the Physical Layer will serve as a valuable reference to engineers and researchers in the fields of security and wireless communications.
Electrical engineering --- Applied physical engineering --- Mass communications --- Programming --- Information systems --- Computer. Automation --- DIP (documentimage processing) --- beeldverwerking --- cryptografie --- spraaktechnologie --- informatica --- informatietechnologie --- elektrotechniek --- communicatietechnologie --- signaalverwerking
Choose an application
This open access book assembles landmark studies on divorce and separation in European countries, and how this affects the life of parents and children. It focuses on four major areas of post-separation lives, namely (1) economic conditions, (2) parent-child relationships, (3) parent and child well-being, and (4) health. Through studies from several European countries, the book showcases how legal regulations and social policies influence parental and child well-being after divorce and separation. It also illustrates how social policies are interwoven with the normative fabric of a country. For example, it is shown that father-child contact after separation is more intense in those countries which have adopted policies that encourage shared parenting. Correspondingly, countries that have adopted these regulations are at the forefront of more egalitarian gender role attitudes. Apart from a strong emphasis on the legal and social policy context, the studies in this volume adopt a longitudinal perspective and situate post-separation behaviour and well-being in the life course. The longitudinal perspective opens up new avenues for research to understand how behaviour and conditions prior or at divorce and separation affect later behaviour and well-being. As such this book is of special appeal to scholars of family research as well as to anyone interested in the role of divorce and separation in Europe in the 21st century.
Sociology of the family. Sociology of sexuality --- Sociology --- Demography --- Politics --- Physiology: reproduction & development. Ages of life --- Human medicine --- levenscyclus --- sociologie --- medisch onderzoek --- demografie --- gezin --- familie --- Europese politiek --- Europe
Choose an application
Mass communications --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- beeldverwerking --- DES (data encryption standard) --- cryptologie --- computerbesturingssystemen --- programmatielogica --- OS (operating system) --- computernetwerken --- communicatietechnologie --- signaalverwerking
Choose an application
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device’s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- draadloze computernetwerken --- mobiele netwerken --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
Choose an application
Choose an application
This disorder transcends multiple disciplines and demands a team approach to improve knowledge and treatment. The highly experienced internationally recognized authors have updated every section and added many new chapters, including some on genetic abnormalities in virus and host seen in PTLDs. In this successor edition, there is a completely new section on PTLDs after hematopoietic stem cell transplantation. The newest PTLD classifications and current treatment paradigms that reflect recently conducted international trials are fully incorporated. As technologies have advanced, this book provided state-of-the-art new diagnostic and prognostic information. Post-Transplant Lymphoproliferative Disorders 2nd Edition is designed to be a valuable reference for oncologists and all transplant professionals, such as surgeons, nephrologists, cardiologists, hepatologists/gastroenterologists, pulmonologists, infectious disease specialists, pathologists, as well as interns and residents in training in these specialists. It provides these professionals with comprehensive and up-to-date information that guides their management of transplant patients before and after transplant, with and without PTLD. .
Oncology. Neoplasms --- Nefrology --- Surgery --- orgaantransplantatie --- nefrologie --- oncologie --- chirurgie --- transplantaties
Choose an application
Listing 1 - 10 of 12 | << page >> |
Sort by
|