Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Physical layer security). Showing records 1 – 30 of 101 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Levels

Country

▼ Search Limiters

1. El-Halabi, Mustapha. Physical-Layer Security: Wide-band Communications & Role of Known Interference.

Degree: 2013, Texas Digital Library

 Data security is of such paramount importance that security measures have been implemented across all layers of a communication network. One layer at which security(more)

Subjects/Keywords: Physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

El-Halabi, M. (2013). Physical-Layer Security: Wide-band Communications & Role of Known Interference. (Thesis). Texas Digital Library. Retrieved from http://hdl.handle.net/1969

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Thesis, Texas Digital Library. Accessed September 18, 2020. http://hdl.handle.net/1969.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Web. 18 Sep 2020.

Vancouver:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Internet] [Thesis]. Texas Digital Library; 2013. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1969.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Thesis]. Texas Digital Library; 2013. Available from: http://hdl.handle.net/1969

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. El-Halabi, Mustapha. Physical-Layer Security: Wide-band Communications and Role of Known Interference.

Degree: 2013, Texas Digital Library

 Data security is of such paramount importance that security measures have been implemented across all layers of a communication network. One layer at which security(more)

Subjects/Keywords: Physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

El-Halabi, M. (2013). Physical-Layer Security: Wide-band Communications and Role of Known Interference. (Thesis). Texas Digital Library. Retrieved from http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications and Role of Known Interference.” 2013. Thesis, Texas Digital Library. Accessed September 18, 2020. http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications and Role of Known Interference.” 2013. Web. 18 Sep 2020.

Vancouver:

El-Halabi M. Physical-Layer Security: Wide-band Communications and Role of Known Interference. [Internet] [Thesis]. Texas Digital Library; 2013. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

El-Halabi M. Physical-Layer Security: Wide-band Communications and Role of Known Interference. [Thesis]. Texas Digital Library; 2013. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Manchester

3. Taha, Hasan. Physical layer based secret key exchange and authentication techniques for wireless networks.

Degree: PhD, 2018, University of Manchester

Security and power consumption are the first critical concerns in many wireless networks as part of the fast progress in a variety of applications over… (more)

Subjects/Keywords: Physical Layer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, H. (2018). Physical layer based secret key exchange and authentication techniques for wireless networks. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446

Chicago Manual of Style (16th Edition):

Taha, Hasan. “Physical layer based secret key exchange and authentication techniques for wireless networks.” 2018. Doctoral Dissertation, University of Manchester. Accessed September 18, 2020. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446.

MLA Handbook (7th Edition):

Taha, Hasan. “Physical layer based secret key exchange and authentication techniques for wireless networks.” 2018. Web. 18 Sep 2020.

Vancouver:

Taha H. Physical layer based secret key exchange and authentication techniques for wireless networks. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2020 Sep 18]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446.

Council of Science Editors:

Taha H. Physical layer based secret key exchange and authentication techniques for wireless networks. [Doctoral Dissertation]. University of Manchester; 2018. Available from: https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446


University of Waterloo

4. Wen, Hong. On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches.

Degree: 2018, University of Waterloo

 Due to the broadcast nature, wireless links are open to malicious intrusions from outsiders, which makes the security issues a critical concern in the wireless… (more)

Subjects/Keywords: Security; Physical-layer Security; Single antenna

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wen, H. (2018). On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/12994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wen, Hong. “On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches.” 2018. Thesis, University of Waterloo. Accessed September 18, 2020. http://hdl.handle.net/10012/12994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wen, Hong. “On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches.” 2018. Web. 18 Sep 2020.

Vancouver:

Wen H. On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches. [Internet] [Thesis]. University of Waterloo; 2018. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/10012/12994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wen H. On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches. [Thesis]. University of Waterloo; 2018. Available from: http://hdl.handle.net/10012/12994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Northeastern University

5. Galagarza Martinez, Edson Stevens. Recent advances on physical layer security for wireless communications.

Degree: MS, Department of Electrical and Computer Engineering, 2018, Northeastern University

 Wireless communications are naturally exposed to important security risks due to their broadcast nature. In contrast with wired communications, no physical medium is isolating the… (more)

Subjects/Keywords: physical layer security; wireless communications; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Galagarza Martinez, E. S. (2018). Recent advances on physical layer security for wireless communications. (Masters Thesis). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20291186

Chicago Manual of Style (16th Edition):

Galagarza Martinez, Edson Stevens. “Recent advances on physical layer security for wireless communications.” 2018. Masters Thesis, Northeastern University. Accessed September 18, 2020. http://hdl.handle.net/2047/D20291186.

MLA Handbook (7th Edition):

Galagarza Martinez, Edson Stevens. “Recent advances on physical layer security for wireless communications.” 2018. Web. 18 Sep 2020.

Vancouver:

Galagarza Martinez ES. Recent advances on physical layer security for wireless communications. [Internet] [Masters thesis]. Northeastern University; 2018. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/2047/D20291186.

Council of Science Editors:

Galagarza Martinez ES. Recent advances on physical layer security for wireless communications. [Masters Thesis]. Northeastern University; 2018. Available from: http://hdl.handle.net/2047/D20291186


University of New South Wales

6. Yan, Shihao. Physical Layer Security: Wireless Location Verification and Secure Communications.

Degree: Electrical Engineering & Telecommunications, 2015, University of New South Wales

 This thesis focuses on the utilization of reliable location information in wireless physical layer security. Specifically, new optimal Location Verification Systems (LVSs) are first developed… (more)

Subjects/Keywords: Wireless Communications; Physical Layer Security; Location Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yan, S. (2015). Physical Layer Security: Wireless Location Verification and Secure Communications. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Yan, Shihao. “Physical Layer Security: Wireless Location Verification and Secure Communications.” 2015. Doctoral Dissertation, University of New South Wales. Accessed September 18, 2020. http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true.

MLA Handbook (7th Edition):

Yan, Shihao. “Physical Layer Security: Wireless Location Verification and Secure Communications.” 2015. Web. 18 Sep 2020.

Vancouver:

Yan S. Physical Layer Security: Wireless Location Verification and Secure Communications. [Internet] [Doctoral dissertation]. University of New South Wales; 2015. [cited 2020 Sep 18]. Available from: http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true.

Council of Science Editors:

Yan S. Physical Layer Security: Wireless Location Verification and Secure Communications. [Doctoral Dissertation]. University of New South Wales; 2015. Available from: http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true


University of New South Wales

7. Liu, Chenxi. Location-based physical layer security in wireless communication systems.

Degree: Electrical Engineering & Telecommunications, 2016, University of New South Wales

 This thesis considers the use of location information as a means to enhance physical layer security in wireless communication systems. The thesis has four main… (more)

Subjects/Keywords: Wiretap channel; Physical layer security; Location information

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, C. (2016). Location-based physical layer security in wireless communication systems. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Liu, Chenxi. “Location-based physical layer security in wireless communication systems.” 2016. Doctoral Dissertation, University of New South Wales. Accessed September 18, 2020. http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true.

MLA Handbook (7th Edition):

Liu, Chenxi. “Location-based physical layer security in wireless communication systems.” 2016. Web. 18 Sep 2020.

Vancouver:

Liu C. Location-based physical layer security in wireless communication systems. [Internet] [Doctoral dissertation]. University of New South Wales; 2016. [cited 2020 Sep 18]. Available from: http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true.

Council of Science Editors:

Liu C. Location-based physical layer security in wireless communication systems. [Doctoral Dissertation]. University of New South Wales; 2016. Available from: http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true


University of Waterloo

8. Chai, Qi. Design and Analysis of Security Schemes for Low-cost RFID Systems.

Degree: 2012, University of Waterloo

 With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides… (more)

Subjects/Keywords: RFID; Physical layer security; Privacy; Lightweight cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chai, Q. (2012). Design and Analysis of Security Schemes for Low-cost RFID Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chai, Qi. “Design and Analysis of Security Schemes for Low-cost RFID Systems.” 2012. Thesis, University of Waterloo. Accessed September 18, 2020. http://hdl.handle.net/10012/6512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chai, Qi. “Design and Analysis of Security Schemes for Low-cost RFID Systems.” 2012. Web. 18 Sep 2020.

Vancouver:

Chai Q. Design and Analysis of Security Schemes for Low-cost RFID Systems. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/10012/6512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chai Q. Design and Analysis of Security Schemes for Low-cost RFID Systems. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

9. Ali, Syed Taha. Security mechanisms for body sensor networks.

Degree: Electrical Engineering & Telecommunications, 2011, University of New South Wales

 Body sensor networks are a key component in the emerging trend towards personalised healthcare monitoring and the mobile health paradigm. These networks consist of miniaturized… (more)

Subjects/Keywords: Privacy; Body area networks; Security; Data forensics; Physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ali, S. T. (2011). Security mechanisms for body sensor networks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Ali, Syed Taha. “Security mechanisms for body sensor networks.” 2011. Doctoral Dissertation, University of New South Wales. Accessed September 18, 2020. http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true.

MLA Handbook (7th Edition):

Ali, Syed Taha. “Security mechanisms for body sensor networks.” 2011. Web. 18 Sep 2020.

Vancouver:

Ali ST. Security mechanisms for body sensor networks. [Internet] [Doctoral dissertation]. University of New South Wales; 2011. [cited 2020 Sep 18]. Available from: http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true.

Council of Science Editors:

Ali ST. Security mechanisms for body sensor networks. [Doctoral Dissertation]. University of New South Wales; 2011. Available from: http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true


University of Waterloo

10. Abubaker, Radi. Channel Based Relay Attack Detection Protocol.

Degree: 2019, University of Waterloo

 A relay attack is a potentially devastating form of a man-in-the-middle attack, that can circumvent any challenge-response authentication protocol. A relay attack also has no… (more)

Subjects/Keywords: relay attack; channel state information; csi; physical layer security; physical-layer security; man-in the middle attack; mitm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abubaker, R. (2019). Channel Based Relay Attack Detection Protocol. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14691

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abubaker, Radi. “Channel Based Relay Attack Detection Protocol.” 2019. Thesis, University of Waterloo. Accessed September 18, 2020. http://hdl.handle.net/10012/14691.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abubaker, Radi. “Channel Based Relay Attack Detection Protocol.” 2019. Web. 18 Sep 2020.

Vancouver:

Abubaker R. Channel Based Relay Attack Detection Protocol. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/10012/14691.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abubaker R. Channel Based Relay Attack Detection Protocol. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/14691

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

11. Kadampot, Ishaque Ashar. Optimal codes for information-theoretically covert communication.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 We consider a problem of coding for covert communication, which involves ensuring reliable communication between two legitimate parties while simultaneously guaranteeing a low probability of… (more)

Subjects/Keywords: Covert communication; Physical-layer security; Coding for secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kadampot, I. A. (2020). Optimal codes for information-theoretically covert communication. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62730

Chicago Manual of Style (16th Edition):

Kadampot, Ishaque Ashar. “Optimal codes for information-theoretically covert communication.” 2020. Doctoral Dissertation, Georgia Tech. Accessed September 18, 2020. http://hdl.handle.net/1853/62730.

MLA Handbook (7th Edition):

Kadampot, Ishaque Ashar. “Optimal codes for information-theoretically covert communication.” 2020. Web. 18 Sep 2020.

Vancouver:

Kadampot IA. Optimal codes for information-theoretically covert communication. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1853/62730.

Council of Science Editors:

Kadampot IA. Optimal codes for information-theoretically covert communication. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62730


NSYSU

12. Chiang, Tsung-Chi. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.

Degree: Master, Communications Engineering, 2018, NSYSU

 In recent years, wireless sensor networks are widely used because they comprised a large number of low-cost, low-power and miniature sensors. In wireless sensor networks,… (more)

Subjects/Keywords: Wireless Sensor Networks; Eavesdropper; Distributed Detection; Physical-Layer Security; Channel Selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiang, T. (2018). Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiang, Tsung-Chi. “Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.” 2018. Thesis, NSYSU. Accessed September 18, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiang, Tsung-Chi. “Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.” 2018. Web. 18 Sep 2020.

Vancouver:

Chiang T. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Sep 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiang T. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Tseng, Shih-Ming. Physical-Layer Security Design for Distributed Detection with Attackers.

Degree: Master, Communications Engineering, 2018, NSYSU

 Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the… (more)

Subjects/Keywords: wireless sensor networks; physical-layer security; eavedroppers; attackers; distributed detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2018). Physical-Layer Security Design for Distributed Detection with Attackers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Thesis, NSYSU. Accessed September 18, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Web. 18 Sep 2020.

Vancouver:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Sep 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Ko, Miyong. Wireless Physical-Layer Security Performance of Uwb systems.

Degree: MS, Electrical & Computer Engineering, 2011, University of Massachusetts

  Traditionally, spread-spectrum systems have been employed to provide low probability-of-intercept (LPI) and low probability-of-detection (LPD) performances at the physical layer, but the messages transmitted… (more)

Subjects/Keywords: UWB; security; wireless; physical layer; Signal Processing; Systems and Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ko, M. (2011). Wireless Physical-Layer Security Performance of Uwb systems. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/689

Chicago Manual of Style (16th Edition):

Ko, Miyong. “Wireless Physical-Layer Security Performance of Uwb systems.” 2011. Masters Thesis, University of Massachusetts. Accessed September 18, 2020. https://scholarworks.umass.edu/theses/689.

MLA Handbook (7th Edition):

Ko, Miyong. “Wireless Physical-Layer Security Performance of Uwb systems.” 2011. Web. 18 Sep 2020.

Vancouver:

Ko M. Wireless Physical-Layer Security Performance of Uwb systems. [Internet] [Masters thesis]. University of Massachusetts; 2011. [cited 2020 Sep 18]. Available from: https://scholarworks.umass.edu/theses/689.

Council of Science Editors:

Ko M. Wireless Physical-Layer Security Performance of Uwb systems. [Masters Thesis]. University of Massachusetts; 2011. Available from: https://scholarworks.umass.edu/theses/689


Australian National University

15. He, Biao. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .

Degree: 2016, Australian National University

 The current research on physical layer security is far from implementations in practical networks, arguably due to impractical assumptions in the literature and the limited… (more)

Subjects/Keywords: physical layer security; wireless communications; secrecy outage probability; secrecy capacity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

He, B. (2016). Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . (Thesis). Australian National University. Retrieved from http://hdl.handle.net/1885/104995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

He, Biao. “Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .” 2016. Thesis, Australian National University. Accessed September 18, 2020. http://hdl.handle.net/1885/104995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

He, Biao. “Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .” 2016. Web. 18 Sep 2020.

Vancouver:

He B. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . [Internet] [Thesis]. Australian National University; 2016. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1885/104995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

He B. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . [Thesis]. Australian National University; 2016. Available from: http://hdl.handle.net/1885/104995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

16. Bao, Tingnan. Physical layer security in emerging wireless transmission systems.

Degree: Department of Electrical and Computer Engineering, 2020, University of Victoria

 Traditional cryptographic encryption techniques at higher layers require a certain form of information sharing between the transmitter and the legitimate user to achieve security. Besides,… (more)

Subjects/Keywords: physical layer security; deep learning; system performance analysis; UAV; beamforming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bao, T. (2020). Physical layer security in emerging wireless transmission systems. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/11912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bao, Tingnan. “Physical layer security in emerging wireless transmission systems.” 2020. Thesis, University of Victoria. Accessed September 18, 2020. http://hdl.handle.net/1828/11912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bao, Tingnan. “Physical layer security in emerging wireless transmission systems.” 2020. Web. 18 Sep 2020.

Vancouver:

Bao T. Physical layer security in emerging wireless transmission systems. [Internet] [Thesis]. University of Victoria; 2020. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1828/11912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bao T. Physical layer security in emerging wireless transmission systems. [Thesis]. University of Victoria; 2020. Available from: http://hdl.handle.net/1828/11912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Taha, Hasan. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.

Degree: 2018, University of Manchester

Security and power consumption are the first critical concerns in many wireless networks as part of the fast progress in a variety of applications over… (more)

Subjects/Keywords: Physical Layer Security

…reasons and ambition towards the physical layer security, we proposed four approaches based on… …physical layer security are based on the information theoretic model introduced by Shannon in… …signal propagation intrinsic randomness. The physical layer security approach has become a… …establish security services, secret key exchange and authentication, at the physical layer in the… …methods, especially for the secret key problem. • Proposing physical layer based security… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, H. (2018). PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845

Chicago Manual of Style (16th Edition):

Taha, Hasan. “PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.” 2018. Doctoral Dissertation, University of Manchester. Accessed September 18, 2020. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845.

MLA Handbook (7th Edition):

Taha, Hasan. “PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.” 2018. Web. 18 Sep 2020.

Vancouver:

Taha H. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2020 Sep 18]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845.

Council of Science Editors:

Taha H. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. [Doctoral Dissertation]. University of Manchester; 2018. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845


University of New South Wales

18. Javali, Chitra. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.

Degree: Computer Science & Engineering, 2017, University of New South Wales

 The tremendous development in wireless technology has lead to accessing abundant information at one's convenient location using hand-held and personal devices. Though the wireless medium… (more)

Subjects/Keywords: Location Proof; Physical layer security; Authentication; Secure pairing; Secret key generation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Javali, C. (2017). Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Javali, Chitra. “Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.” 2017. Doctoral Dissertation, University of New South Wales. Accessed September 18, 2020. http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true.

MLA Handbook (7th Edition):

Javali, Chitra. “Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.” 2017. Web. 18 Sep 2020.

Vancouver:

Javali C. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2020 Sep 18]. Available from: http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true.

Council of Science Editors:

Javali C. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true


University of Edinburgh

19. Liu, Weigang. Enhancing physical layer security in wireless networks with cooperative approaches.

Degree: PhD, 2016, University of Edinburgh

 Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are… (more)

Subjects/Keywords: 621.382; physical layer security; convex optimization; stochastic geometry

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, W. (2016). Enhancing physical layer security in wireless networks with cooperative approaches. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/19565

Chicago Manual of Style (16th Edition):

Liu, Weigang. “Enhancing physical layer security in wireless networks with cooperative approaches.” 2016. Doctoral Dissertation, University of Edinburgh. Accessed September 18, 2020. http://hdl.handle.net/1842/19565.

MLA Handbook (7th Edition):

Liu, Weigang. “Enhancing physical layer security in wireless networks with cooperative approaches.” 2016. Web. 18 Sep 2020.

Vancouver:

Liu W. Enhancing physical layer security in wireless networks with cooperative approaches. [Internet] [Doctoral dissertation]. University of Edinburgh; 2016. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1842/19565.

Council of Science Editors:

Liu W. Enhancing physical layer security in wireless networks with cooperative approaches. [Doctoral Dissertation]. University of Edinburgh; 2016. Available from: http://hdl.handle.net/1842/19565


Rice University

20. Yeh, Chia-Yi. Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach.

Degree: MS, Engineering, 2018, Rice University

 Massive MIMO systems have the potential for preventing passive eavesdropping as the signal transmitted by a large antenna array becomes highly focused. Prior works showed… (more)

Subjects/Keywords: massive MIMO; passive eavesdropping; measurements; physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yeh, C. (2018). Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach. (Masters Thesis). Rice University. Retrieved from http://hdl.handle.net/1911/105588

Chicago Manual of Style (16th Edition):

Yeh, Chia-Yi. “Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach.” 2018. Masters Thesis, Rice University. Accessed September 18, 2020. http://hdl.handle.net/1911/105588.

MLA Handbook (7th Edition):

Yeh, Chia-Yi. “Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach.” 2018. Web. 18 Sep 2020.

Vancouver:

Yeh C. Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach. [Internet] [Masters thesis]. Rice University; 2018. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1911/105588.

Council of Science Editors:

Yeh C. Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach. [Masters Thesis]. Rice University; 2018. Available from: http://hdl.handle.net/1911/105588


Georgia Tech

21. Harper, Andrew. Interference design in wireless communication systems.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 Interference in wireless communication systems is generally thought of as being produced by an outside, uncontrolled source. With this philosophy, interference must be accounted for… (more)

Subjects/Keywords: Interference; Wireless communication; Physical layer security; Joint radar-communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harper, A. (2016). Interference design in wireless communication systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58167

Chicago Manual of Style (16th Edition):

Harper, Andrew. “Interference design in wireless communication systems.” 2016. Doctoral Dissertation, Georgia Tech. Accessed September 18, 2020. http://hdl.handle.net/1853/58167.

MLA Handbook (7th Edition):

Harper, Andrew. “Interference design in wireless communication systems.” 2016. Web. 18 Sep 2020.

Vancouver:

Harper A. Interference design in wireless communication systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1853/58167.

Council of Science Editors:

Harper A. Interference design in wireless communication systems. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/58167


University of Manchester

22. Alotaibi, Nafel Nahes A. Improving secrecy and spectral efficiency of wireless communications.

Degree: PhD, 2016, University of Manchester

 The current and future demand for wireless technology is increasing rapidlyin the era of Internet-of-things, information-shower, auto-drive vehicles andthe fifth generation of mobile communications. The… (more)

Subjects/Keywords: 621.382; physical layer security; spectral efficiency; phased antenna array; wireless communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, N. N. A. (2016). Improving secrecy and spectral efficiency of wireless communications. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621

Chicago Manual of Style (16th Edition):

Alotaibi, Nafel Nahes A. “Improving secrecy and spectral efficiency of wireless communications.” 2016. Doctoral Dissertation, University of Manchester. Accessed September 18, 2020. https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621.

MLA Handbook (7th Edition):

Alotaibi, Nafel Nahes A. “Improving secrecy and spectral efficiency of wireless communications.” 2016. Web. 18 Sep 2020.

Vancouver:

Alotaibi NNA. Improving secrecy and spectral efficiency of wireless communications. [Internet] [Doctoral dissertation]. University of Manchester; 2016. [cited 2020 Sep 18]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621.

Council of Science Editors:

Alotaibi NNA. Improving secrecy and spectral efficiency of wireless communications. [Doctoral Dissertation]. University of Manchester; 2016. Available from: https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621


University of Waterloo

23. Bagheri-Karam, Ghadamali. Physical-Layer Security in Wireless Communication Systems.

Degree: 2010, University of Waterloo

 The use of wireless networks has grown significantly in contemporary times, and continues to develop further. The broadcast nature of wireless communications, however, makes them… (more)

Subjects/Keywords: Information Theory; Physical-Layer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/5167

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bagheri-Karam, Ghadamali. “Physical-Layer Security in Wireless Communication Systems.” 2010. Thesis, University of Waterloo. Accessed September 18, 2020. http://hdl.handle.net/10012/5167.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bagheri-Karam, Ghadamali. “Physical-Layer Security in Wireless Communication Systems.” 2010. Web. 18 Sep 2020.

Vancouver:

Bagheri-Karam G. Physical-Layer Security in Wireless Communication Systems. [Internet] [Thesis]. University of Waterloo; 2010. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/10012/5167.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bagheri-Karam G. Physical-Layer Security in Wireless Communication Systems. [Thesis]. University of Waterloo; 2010. Available from: http://hdl.handle.net/10012/5167

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Yamada, Randy Matthew. New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity.

Degree: PhD, Electrical Engineering, 2017, Virginia Tech

 The proliferation of connected embedded devices has driven wireless communications into commercial, military, industrial, and personal systems. It is unreasonable to expect privacy and security(more)

Subjects/Keywords: Directional Modulation; Physical Layer Security; Beamforming; Array; Broadcast Channel; Secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yamada, R. M. (2017). New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/88956

Chicago Manual of Style (16th Edition):

Yamada, Randy Matthew. “New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 18, 2020. http://hdl.handle.net/10919/88956.

MLA Handbook (7th Edition):

Yamada, Randy Matthew. “New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity.” 2017. Web. 18 Sep 2020.

Vancouver:

Yamada RM. New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/10919/88956.

Council of Science Editors:

Yamada RM. New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/88956


University of Maryland

25. Jain, Shalabh. Security and Trust in Mobile Ad-Hoc Networks.

Degree: Electrical Engineering, 2015, University of Maryland

 Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such networks have widespread applications in commercial, civil and military domains. Systems utilizing these… (more)

Subjects/Keywords: Electrical engineering; Computer science; MANET; Physical Layer Watermarking; Privacy; Security; Trust

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jain, S. (2015). Security and Trust in Mobile Ad-Hoc Networks. (Thesis). University of Maryland. Retrieved from http://hdl.handle.net/1903/16549

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jain, Shalabh. “Security and Trust in Mobile Ad-Hoc Networks.” 2015. Thesis, University of Maryland. Accessed September 18, 2020. http://hdl.handle.net/1903/16549.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jain, Shalabh. “Security and Trust in Mobile Ad-Hoc Networks.” 2015. Web. 18 Sep 2020.

Vancouver:

Jain S. Security and Trust in Mobile Ad-Hoc Networks. [Internet] [Thesis]. University of Maryland; 2015. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/1903/16549.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jain S. Security and Trust in Mobile Ad-Hoc Networks. [Thesis]. University of Maryland; 2015. Available from: http://hdl.handle.net/1903/16549

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


The Ohio State University

26. Basciftci, Yuksel O, Basciftci. Private and Secure Data Communication: Information Theoretic Approach.

Degree: PhD, Electrical and Computer Engineering, 2016, The Ohio State University

 Wireless networks flourishing worldwide enable online services, such as social networks and search engines to serve huge number of users and to collect large amount… (more)

Subjects/Keywords: Electrical Engineering; Data privacy, data security, information theory, physical layer security, wireless communiation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basciftci, Yuksel O, B. (2016). Private and Secure Data Communication: Information Theoretic Approach. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249

Chicago Manual of Style (16th Edition):

Basciftci, Yuksel O, Basciftci. “Private and Secure Data Communication: Information Theoretic Approach.” 2016. Doctoral Dissertation, The Ohio State University. Accessed September 18, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249.

MLA Handbook (7th Edition):

Basciftci, Yuksel O, Basciftci. “Private and Secure Data Communication: Information Theoretic Approach.” 2016. Web. 18 Sep 2020.

Vancouver:

Basciftci, Yuksel O B. Private and Secure Data Communication: Information Theoretic Approach. [Internet] [Doctoral dissertation]. The Ohio State University; 2016. [cited 2020 Sep 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249.

Council of Science Editors:

Basciftci, Yuksel O B. Private and Secure Data Communication: Information Theoretic Approach. [Doctoral Dissertation]. The Ohio State University; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249


University of Dayton

27. Yu, Jiahui. Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications.

Degree: MS(M.S.), Electrical and Computer Engineering, 2019, University of Dayton

 The Internet-of-Things (IoT) will connect different types of cyber physical systems that are supported by different wireless transmission technologies, e.g., Wi-Fi, ZigBee, etc. However, the… (more)

Subjects/Keywords: Computer Engineering; Physical layer security; Seamless IoT; Authentication; Security parameter generation; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, J. (2019). Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications. (Masters Thesis). University of Dayton. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975

Chicago Manual of Style (16th Edition):

Yu, Jiahui. “Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications.” 2019. Masters Thesis, University of Dayton. Accessed September 18, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975.

MLA Handbook (7th Edition):

Yu, Jiahui. “Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications.” 2019. Web. 18 Sep 2020.

Vancouver:

Yu J. Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications. [Internet] [Masters thesis]. University of Dayton; 2019. [cited 2020 Sep 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975.

Council of Science Editors:

Yu J. Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications. [Masters Thesis]. University of Dayton; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975


Virginia Tech

28. Shahriar, Chowdhury MR. Resilient Waveform Design for OFDM-MIMO Communication Systems.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto'… (more)

Subjects/Keywords: Physical-Layer Security; Communications Security; OFDM; MIMO; Jamming; Antijam; Equalization Attack; Pilot Attack; LTE; WiMAX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahriar, C. M. (2015). Resilient Waveform Design for OFDM-MIMO Communication Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/56973

Chicago Manual of Style (16th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 18, 2020. http://hdl.handle.net/10919/56973.

MLA Handbook (7th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Web. 18 Sep 2020.

Vancouver:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2020 Sep 18]. Available from: http://hdl.handle.net/10919/56973.

Council of Science Editors:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/56973


University of California – Irvine

29. ZAMAN, IMAMUZ. Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link.

Degree: Electrical and Computer Engineering, 2018, University of California – Irvine

 Point to Point Optical Link (PPOL) and Inter Vehicular Visible Light Communications (IVVLC) as susceptible to many security threats including jamming, eavesdropping, interception and physical(more)

Subjects/Keywords: Electrical engineering; Communication; Optical Fiber; Physical Layer Security; PMD; Security; Symmetric Key

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ZAMAN, I. (2018). Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/81b411vt

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

ZAMAN, IMAMUZ. “Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link.” 2018. Thesis, University of California – Irvine. Accessed September 18, 2020. http://www.escholarship.org/uc/item/81b411vt.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

ZAMAN, IMAMUZ. “Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link.” 2018. Web. 18 Sep 2020.

Vancouver:

ZAMAN I. Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link. [Internet] [Thesis]. University of California – Irvine; 2018. [cited 2020 Sep 18]. Available from: http://www.escholarship.org/uc/item/81b411vt.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

ZAMAN I. Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link. [Thesis]. University of California – Irvine; 2018. Available from: http://www.escholarship.org/uc/item/81b411vt

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

30. Song, Hui-Xuan. Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers.

Degree: Master, Communications Engineering, 2017, NSYSU

 In this thesis, a scheme using jamming signal is adopted to improve the physical- layer security of a decode-and- forward cooperated relay network in the… (more)

Subjects/Keywords: outage probability; decode- and-forward; relay selection; cooperated network; physical-layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, H. (2017). Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Song, Hui-Xuan. “Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers.” 2017. Thesis, NSYSU. Accessed September 18, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Song, Hui-Xuan. “Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers.” 2017. Web. 18 Sep 2020.

Vancouver:

Song H. Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers. [Internet] [Thesis]. NSYSU; 2017. [cited 2020 Sep 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Song H. Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4]

.