Information Theoretic Security and Privacy of Information Systems

Nonfiction, Science & Nature, Technology, Engineering, Computers, General Computing
Cover of the book Information Theoretic Security and Privacy of Information Systems by , Cambridge University Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781108206686
Publisher: Cambridge University Press Publication: June 16, 2017
Imprint: Cambridge University Press Language: English
Author:
ISBN: 9781108206686
Publisher: Cambridge University Press
Publication: June 16, 2017
Imprint: Cambridge University Press
Language: English

Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways of addressing issues of data security, embedded security, privacy, and authentication in modern information systems. A wide range of wireless and cyber-physical systems is considered, including 5G cellular networks, the Tactile Internet, biometric identification systems, online data repositories, and smart electricity grids. This is an invaluable guide for both researchers and graduate students working in communications engineering, and industry practitioners and regulators interested in improving security in the next generation of information systems.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways of addressing issues of data security, embedded security, privacy, and authentication in modern information systems. A wide range of wireless and cyber-physical systems is considered, including 5G cellular networks, the Tactile Internet, biometric identification systems, online data repositories, and smart electricity grids. This is an invaluable guide for both researchers and graduate students working in communications engineering, and industry practitioners and regulators interested in improving security in the next generation of information systems.

More books from Cambridge University Press

Cover of the book Consciousness and the Self by
Cover of the book Merciful Judgments and Contemporary Society by
Cover of the book Human Rights, State Compliance, and Social Change by
Cover of the book Linguistic Interaction in Roman Comedy by
Cover of the book Genocide and International Relations by
Cover of the book Thermodynamics with Chemical Engineering Applications by
Cover of the book Mixed Methods Social Networks Research by
Cover of the book Enumerative Combinatorics: Volume 1 by
Cover of the book Bayesian Methods for Ecology by
Cover of the book Knowledge, Thought, and the Case for Dualism by
Cover of the book The Reflexive Imperative in Late Modernity by
Cover of the book Hegel on Philosophy in History by
Cover of the book Democratic Deficit by
Cover of the book Proof of Causation in Tort Law by
Cover of the book Principles of LED Light Communications by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy