Information Theoretic Security and Privacy of Information Systems Front Cover

Information Theoretic Security and Privacy of Information Systems

Description

Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways of addressing issues of data security, embedded security, privacy, and authentication in modern information systems. A wide range of wireless and cyber-physical systems is considered, including 5G cellular networks, the Tactile Internet, biometric identification systems, online data repositories, and smart electricity grids. This is an invaluable guide for both researchers and graduate students working in communications engineering, and industry practitioners and regulators interested in improving security in the next generation of information systems.

Table of Contents

Part I Theoretical Foundations
Chapter 1 Effective Secrecy: Reliability, Confusion, And Stealth
Chapter 2 Error-Free Perfect Secrecy Systems
Chapter 3 Secure Source Coding
Chapter 4 Networked Secure Source Coding

Part II Secure Communication
Chapter 5 Secrecy Rate Maximization In Gaussian Mimo Wiretap Channels
Chapter 6 Mimo Wiretap Channels
Chapter 7 Miso Wiretap Channel With Strictly Causal Csi: A Topological Viewpoint
Chapter 8 Physical-Layer Security With Delayed, Hybrid, And Alternating Channel State Knowledge
Chapter 9 Stochastic Orders, Alignments, And Ergodic Secrecy Capacity
Chapter 10 The Discrete Memoryless Arbitrarily Varying Wiretap Channel
Chapter 11 Super-Activation As A Unique Feature Of Secure Communication Over Arbitrarily Varying Channels

Part III Secret Key Generation and Authentication
Chapter 12 Multiple Secret Key Generation: Information Theoretic Models And Key Capacity Regions
Chapter 13 Secret Key Generation For Physical Unclonable Functions
Chapter 14 Wireless Physical-Layer Authentication For The Internet Of Things

Part IV Data Systems and Related Applications
Chapter 15 Information Theoretic Analysis Of The Performance Of Biometric Authentication Systems
Chapter 16 Joint Privacy And Security Of Multiple Biometric Systems
Chapter 17 Information Theoretic Approaches To Privacy-Preserving Information Access And Dissemination
Chapter 18 Privacy In The Smart Grid: Information, Control, And Games
Chapter 19 Security In Distributed Storage Systems

To access the link, solve the captcha.