Skip to content
Cart

Your Cart

×

You have 0 items in your cart.

Register Sign in Wishlist

Information Theoretic Security and Privacy of Information Systems

$125.00 (P)

Jie Hou, Gerhard Kramer, Matthieu Bloch, Siu-Wai Ho, Terence Chan, Alex Grant, Chinthani Uduwerelle, Paul Cuff, Curt Schieler, Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund, Sergey Loyka, Charalambos D. Charalambous, Mohamed Nafea, Aylin Yener, Zohaib Hassan Awan, Aydin Sezgin, Pritam Mukherjee, Ravi Tandon, Sennur Ulukus, Pin-Hsun Lin, Eduard A. Jorswieck, Janis Notzel, Moritz Wiese, Holger Boche, Rafael F. Schaefer, H. Vincent Poor, Huishuai Zhang, Yingbin Liang, Lifeng Lai, Shlomo Shamai (Shitz), Michael Pehl, Matthias Hiller, Georg Sigl, Gianluca Caparra, Marco Centenaro, Nicola Laurenti, Stefano Tomasin, Lorenzo Vangelista, Tanya Ignatenko, Frans M. J. Willems, Adina Goldberg, Stark C. Draper, Salim El Rouayheb, Sreechakra Goparaju, Kannan Ramchandran
View all contributors
  • Date Published: June 2017
  • availability: In stock
  • format: Hardback
  • isbn: 9781107132269

$ 125.00 (P)
Hardback

Add to cart Add to wishlist

Other available formats:
eBook


Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact collegesales@cambridge.org providing details of the course you are teaching.

Description
Product filter button
Description
Contents
Resources
Courses
About the Authors
  • Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways of addressing issues of data security, embedded security, privacy, and authentication in modern information systems. A wide range of wireless and cyber-physical systems is considered, including 5G cellular networks, the Tactile Internet, biometric identification systems, online data repositories, and smart electricity grids. This is an invaluable guide for both researchers and graduate students working in communications engineering, and industry practitioners and regulators interested in improving security in the next generation of information systems.

    • Provides a new approach for addressing issues of data security and privacy in information systems and emerging network paradigms
    • Focuses on theoretical models and analytical results
    • Written by leading experts in information theoretic security
    Read more

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity

    ×

    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?

    ×

    Product details

    • Date Published: June 2017
    • format: Hardback
    • isbn: 9781107132269
    • length: 578 pages
    • dimensions: 254 x 180 x 29 mm
    • weight: 1.23kg
    • contains: 133 b/w illus. 9 tables
    • availability: In stock
  • Table of Contents

    Part I. Theoretical Foundations:
    1. Effective secrecy: reliability, confusion and stealth Jie Hou, Gerhard Kramer and Matthieu Bloch
    2. Error free perfect secrecy systems Siu-Wai Ho, Terence Chan, Alex Grant and Chinthani Uduwerelle
    3. Secure source coding Paul Cuff and Curt Schieler
    4. Networked secure source coding Kittipong Kittichokechai, Tobias J. Oechtering and Mikael Skoglund
    Part II. Secure Communication:
    5. Secrecy rate Maximization in Gaussian MIMO wiretap channels Sergey Loyka and Charalambos D. Charalambous
    6. MIMO wire-tap channels Mohamed Nafea and Aylin Yener
    7. MISO wiretap channel with strictly causal CSI: a topological viewpoint Zohaib Hassan Awan and Aydin Sezgin
    8. Physical layer security with delayed, hybrid and alternating channel state knowledge Pritam Mukherjee, Ravi Tandon and Sennur Ulukus
    9. Stochastic orders, alignments, and ergodic secrecy capacity Pin-Hsun Lin and Eduard A. Jorswieck
    10. The discrete memoryless arbitrarily varying wiretap channel Janis Notzel, Moritz Wiese and Holger Boche
    11. Super-activation as a unique feature of secure communication over arbitrarily varying channels Rafael F. Schaefer, Holger Boche and H. Vincent Poor
    Part III. Secret Key Generation and Authentication:
    12. Multiple secret key generation: information theoretic models and key capacity regions Huishuai Zhang, Yingbin Liang, Lifeng Lai and Shlomo Shamai (Shitz)
    13. Secret key generation for physical unclonable functions Michael Pehl, Matthias Hiller and Georg Sigl
    14. Wireless physical layer authentication for the Internet of Things Gianluca Caparra, Marco Centenaro, Nicola Laurenti, Stefano Tomasin and Lorenzo Vangelista
    Part IV. Data Systems and Related Applications:
    15. Information theoretic analysis of the performance of biometric authentication systems Tanya Ignatenko and Frans M. J. Willems
    16. Joint privacy and security of multiple biometric systems Adina Goldberg and Stark C. Draper
    17. Information-theoretic approaches to privacy-preserving information access and dissemination Giulia Fanti and Kannan Ramchandran
    18. Privacy in the smart grid: information, control and games H. Vincent Poor
    19. Security in distributed storage systems Salim El Rouayheb, Sreechakra Goparaju and Kannan Ramchandran.

  • Editors

    Rafael F. Schaefer, Technische Universität Berlin
    Rafael F. Schaefer is an Assistant Professor at the Technische Universität Berlin, having previously worked at Princeton University, New Jersey.

    Holger Boche, Technische Universität München
    Holger Boche is a Full Professor at the Technische Universität München, a member of the German Academy of Sciences, and a Fellow of the Institute of Electrical and Electronics Engineers. He is also a co-editor of Mechanisms and Games for Dynamic Spectrum Allocation (Cambridge, 2013).

    Ashish Khisti, University of Toronto
    Ashish Khisti is an Associate Professor and a Canada Research Chair in the Department of Electrical and Computer Engineering at the University of Toronto.

    H. Vincent Poor, Princeton University, New Jersey
    H. Vincent Poor is the Michael Henry Strater University Professor at Princeton University, New Jersey, a member of the US National Academies of Engineering and Sciences, and a Fellow of the Institute of Electrical and Electronics Engineers. He has co-authored and co-edited several books, including Quickest Detection (Cambridge, 2008) and Smart Grid Communications and Networking (Cambridge, 2012).

    Contributors

    Jie Hou, Gerhard Kramer, Matthieu Bloch, Siu-Wai Ho, Terence Chan, Alex Grant, Chinthani Uduwerelle, Paul Cuff, Curt Schieler, Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund, Sergey Loyka, Charalambos D. Charalambous, Mohamed Nafea, Aylin Yener, Zohaib Hassan Awan, Aydin Sezgin, Pritam Mukherjee, Ravi Tandon, Sennur Ulukus, Pin-Hsun Lin, Eduard A. Jorswieck, Janis Notzel, Moritz Wiese, Holger Boche, Rafael F. Schaefer, H. Vincent Poor, Huishuai Zhang, Yingbin Liang, Lifeng Lai, Shlomo Shamai (Shitz), Michael Pehl, Matthias Hiller, Georg Sigl, Gianluca Caparra, Marco Centenaro, Nicola Laurenti, Stefano Tomasin, Lorenzo Vangelista, Tanya Ignatenko, Frans M. J. Willems, Adina Goldberg, Stark C. Draper, Salim El Rouayheb, Sreechakra Goparaju, Kannan Ramchandran

Sign In

Please sign in to access your account

Cancel

Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email lecturers@cambridge.org

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.

Cancel

Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

×
Please fill in the required fields in your feedback submission.
×