Skip to main content
  • Conference proceedings
  • © 2018

Proceedings of the 2nd Workshop on Communication Security

Cryptography and Physical Layer Security

  • Describes applications of physical and data-link layer security techniques in many communication systems
  • Presents cutting-edge research on security topics from various perspectives
  • Addresses both unconditional and computational security aspects
  • Proceedings of the Second Workshop on Communication Security, Paris, on 30 April 2017
  • Includes supplementary material: sn.pub/extras

Part of the book series: Lecture Notes in Electrical Engineering (LNEE, volume 447)

Conference series link(s): WCS: International Worskhop on Communication Security

Conference proceedings info: WCS 2017.

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (9 papers)

  1. Front Matter

    Pages i-xiii
  2. Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks

    • Stefan Pfennig, Sabrina Engelmann, Elke Franz, Anne Wolf
    Pages 15-32
  3. Semantically-Secured Message-Key Trade-Off over Wiretap Channels with Random Parameters

    • Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai (Shitz), Paul Cuff, Pablo Piantanida
    Pages 33-48
  4. Hash-then-Encode: A Modular Semantically Secure Wiretap Code

    • Setareh Sharifian, Fuchun Lin, Reihaneh Safavi-Naini
    Pages 49-63
  5. A CCA-Secure Cryptosystem Using Massive MIMO Channels

    • Thomas Dean, Andrea Goldsmith
    Pages 65-77
  6. You Are How You Play: Authenticating Mobile Users via Game Playing

    • Riccardo Spolaor, Merylin Monaro, Pasquale Capuozzo, Marco Baesso, Mauro Conti, Luciano Gamberini et al.
    Pages 79-96
  7. Fuzzy Authentication Using Rank Distance

    • Alessandro Neri, Joachim Rosenthal, Davide Schipani
    Pages 97-108
  8. A McEliece-Based Key Exchange Protocol for Optical Communication Systems

    • Joo Yeon Cho, Helmut Griesser, Danish Rafique
    Pages 109-123
  9. An ICN-Based Authentication Protocol for a Simplified LTE Architecture

    • Alberto Compagno, Mauro Conti, Muhammad Hassan
    Pages 125-140
  10. Back Matter

    Pages 141-141

Other Volumes

  1. Proceedings of the 2nd Workshop on Communication Security

About this book

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

Editors and Affiliations

  • Università Politecnica delle Marche, Ancona, Italy

    Marco Baldi

  • Royal Holloway, University of London, Egham, United Kingdom

    Elizabeth A. Quaglia

  • University of Padova, Padova, Italy

    Stefano Tomasin

Bibliographic Information

  • Book Title: Proceedings of the 2nd Workshop on Communication Security

  • Book Subtitle: Cryptography and Physical Layer Security

  • Editors: Marco Baldi, Elizabeth A. Quaglia, Stefano Tomasin

  • Series Title: Lecture Notes in Electrical Engineering

  • DOI: https://doi.org/10.1007/978-3-319-59265-7

  • Publisher: Springer Cham

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer International Publishing AG, part of Springer Nature 2018

  • Hardcover ISBN: 978-3-319-59264-0Published: 14 July 2017

  • Softcover ISBN: 978-3-319-86584-3Published: 04 August 2018

  • eBook ISBN: 978-3-319-59265-7Published: 11 July 2017

  • Series ISSN: 1876-1100

  • Series E-ISSN: 1876-1119

  • Edition Number: 1

  • Number of Pages: XIII, 141

  • Number of Illustrations: 13 b/w illustrations, 14 illustrations in colour

  • Topics: Communications Engineering, Networks, Systems and Data Security, Cryptology, Algorithm Analysis and Problem Complexity

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access