Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(physical layer security). Showing records 1 – 30 of 93 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Levels

Country

▼ Search Limiters

1. El-Halabi, Mustapha. Physical-Layer Security: Wide-band Communications & Role of Known Interference.

Degree: 2013, Texas Digital Library

 Data security is of such paramount importance that security measures have been implemented across all layers of a communication network. One layer at which security(more)

Subjects/Keywords: Physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

El-Halabi, M. (2013). Physical-Layer Security: Wide-band Communications & Role of Known Interference. (Thesis). Texas Digital Library. Retrieved from http://hdl.handle.net/1969

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Thesis, Texas Digital Library. Accessed June 05, 2020. http://hdl.handle.net/1969.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Web. 05 Jun 2020.

Vancouver:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Internet] [Thesis]. Texas Digital Library; 2013. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/1969.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Thesis]. Texas Digital Library; 2013. Available from: http://hdl.handle.net/1969

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. El-Halabi, Mustapha. Physical-Layer Security: Wide-band Communications and Role of Known Interference.

Degree: 2013, Texas Digital Library

 Data security is of such paramount importance that security measures have been implemented across all layers of a communication network. One layer at which security(more)

Subjects/Keywords: Physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

El-Halabi, M. (2013). Physical-Layer Security: Wide-band Communications and Role of Known Interference. (Thesis). Texas Digital Library. Retrieved from http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications and Role of Known Interference.” 2013. Thesis, Texas Digital Library. Accessed June 05, 2020. http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications and Role of Known Interference.” 2013. Web. 05 Jun 2020.

Vancouver:

El-Halabi M. Physical-Layer Security: Wide-band Communications and Role of Known Interference. [Internet] [Thesis]. Texas Digital Library; 2013. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

El-Halabi M. Physical-Layer Security: Wide-band Communications and Role of Known Interference. [Thesis]. Texas Digital Library; 2013. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Manchester

3. Taha, Hasan. Physical layer based secret key exchange and authentication techniques for wireless networks.

Degree: PhD, 2018, University of Manchester

Security and power consumption are the first critical concerns in many wireless networks as part of the fast progress in a variety of applications over… (more)

Subjects/Keywords: Physical Layer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, H. (2018). Physical layer based secret key exchange and authentication techniques for wireless networks. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446

Chicago Manual of Style (16th Edition):

Taha, Hasan. “Physical layer based secret key exchange and authentication techniques for wireless networks.” 2018. Doctoral Dissertation, University of Manchester. Accessed June 05, 2020. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446.

MLA Handbook (7th Edition):

Taha, Hasan. “Physical layer based secret key exchange and authentication techniques for wireless networks.” 2018. Web. 05 Jun 2020.

Vancouver:

Taha H. Physical layer based secret key exchange and authentication techniques for wireless networks. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2020 Jun 05]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446.

Council of Science Editors:

Taha H. Physical layer based secret key exchange and authentication techniques for wireless networks. [Doctoral Dissertation]. University of Manchester; 2018. Available from: https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446


University of Waterloo

4. Bagheri-Karam, Ghadamali. Physical-Layer Security in Wireless Communication Systems.

Degree: 2010, University of Waterloo

 The use of wireless networks has grown significantly in contemporary times, and continues to develop further. The broadcast nature of wireless communications, however, makes them… (more)

Subjects/Keywords: Information Theory; Physical-Layer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/5167

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bagheri-Karam, Ghadamali. “Physical-Layer Security in Wireless Communication Systems.” 2010. Thesis, University of Waterloo. Accessed June 05, 2020. http://hdl.handle.net/10012/5167.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bagheri-Karam, Ghadamali. “Physical-Layer Security in Wireless Communication Systems.” 2010. Web. 05 Jun 2020.

Vancouver:

Bagheri-Karam G. Physical-Layer Security in Wireless Communication Systems. [Internet] [Thesis]. University of Waterloo; 2010. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/10012/5167.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bagheri-Karam G. Physical-Layer Security in Wireless Communication Systems. [Thesis]. University of Waterloo; 2010. Available from: http://hdl.handle.net/10012/5167

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

5. Wen, Hong. On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches.

Degree: 2018, University of Waterloo

 Due to the broadcast nature, wireless links are open to malicious intrusions from outsiders, which makes the security issues a critical concern in the wireless… (more)

Subjects/Keywords: Security; Physical-layer Security; Single antenna

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wen, H. (2018). On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/12994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wen, Hong. “On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches.” 2018. Thesis, University of Waterloo. Accessed June 05, 2020. http://hdl.handle.net/10012/12994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wen, Hong. “On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches.” 2018. Web. 05 Jun 2020.

Vancouver:

Wen H. On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches. [Internet] [Thesis]. University of Waterloo; 2018. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/10012/12994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wen H. On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches. [Thesis]. University of Waterloo; 2018. Available from: http://hdl.handle.net/10012/12994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Northeastern University

6. Galagarza Martinez, Edson Stevens. Recent advances on physical layer security for wireless communications.

Degree: MS, Department of Electrical and Computer Engineering, 2018, Northeastern University

 Wireless communications are naturally exposed to important security risks due to their broadcast nature. In contrast with wired communications, no physical medium is isolating the… (more)

Subjects/Keywords: physical layer security; wireless communications; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Galagarza Martinez, E. S. (2018). Recent advances on physical layer security for wireless communications. (Masters Thesis). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20291186

Chicago Manual of Style (16th Edition):

Galagarza Martinez, Edson Stevens. “Recent advances on physical layer security for wireless communications.” 2018. Masters Thesis, Northeastern University. Accessed June 05, 2020. http://hdl.handle.net/2047/D20291186.

MLA Handbook (7th Edition):

Galagarza Martinez, Edson Stevens. “Recent advances on physical layer security for wireless communications.” 2018. Web. 05 Jun 2020.

Vancouver:

Galagarza Martinez ES. Recent advances on physical layer security for wireless communications. [Internet] [Masters thesis]. Northeastern University; 2018. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/2047/D20291186.

Council of Science Editors:

Galagarza Martinez ES. Recent advances on physical layer security for wireless communications. [Masters Thesis]. Northeastern University; 2018. Available from: http://hdl.handle.net/2047/D20291186


University of Waterloo

7. Chai, Qi. Design and Analysis of Security Schemes for Low-cost RFID Systems.

Degree: 2012, University of Waterloo

 With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides… (more)

Subjects/Keywords: RFID; Physical layer security; Privacy; Lightweight cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chai, Q. (2012). Design and Analysis of Security Schemes for Low-cost RFID Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chai, Qi. “Design and Analysis of Security Schemes for Low-cost RFID Systems.” 2012. Thesis, University of Waterloo. Accessed June 05, 2020. http://hdl.handle.net/10012/6512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chai, Qi. “Design and Analysis of Security Schemes for Low-cost RFID Systems.” 2012. Web. 05 Jun 2020.

Vancouver:

Chai Q. Design and Analysis of Security Schemes for Low-cost RFID Systems. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/10012/6512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chai Q. Design and Analysis of Security Schemes for Low-cost RFID Systems. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

8. Yan, Shihao. Physical Layer Security: Wireless Location Verification and Secure Communications.

Degree: Electrical Engineering & Telecommunications, 2015, University of New South Wales

 This thesis focuses on the utilization of reliable location information in wireless physical layer security. Specifically, new optimal Location Verification Systems (LVSs) are first developed… (more)

Subjects/Keywords: Wireless Communications; Physical Layer Security; Location Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yan, S. (2015). Physical Layer Security: Wireless Location Verification and Secure Communications. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Yan, Shihao. “Physical Layer Security: Wireless Location Verification and Secure Communications.” 2015. Doctoral Dissertation, University of New South Wales. Accessed June 05, 2020. http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true.

MLA Handbook (7th Edition):

Yan, Shihao. “Physical Layer Security: Wireless Location Verification and Secure Communications.” 2015. Web. 05 Jun 2020.

Vancouver:

Yan S. Physical Layer Security: Wireless Location Verification and Secure Communications. [Internet] [Doctoral dissertation]. University of New South Wales; 2015. [cited 2020 Jun 05]. Available from: http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true.

Council of Science Editors:

Yan S. Physical Layer Security: Wireless Location Verification and Secure Communications. [Doctoral Dissertation]. University of New South Wales; 2015. Available from: http://handle.unsw.edu.au/1959.4/54294 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:34693/SOURCE02?view=true


University of New South Wales

9. Liu, Chenxi. Location-based physical layer security in wireless communication systems.

Degree: Electrical Engineering & Telecommunications, 2016, University of New South Wales

 This thesis considers the use of location information as a means to enhance physical layer security in wireless communication systems. The thesis has four main… (more)

Subjects/Keywords: Wiretap channel; Physical layer security; Location information

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, C. (2016). Location-based physical layer security in wireless communication systems. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Liu, Chenxi. “Location-based physical layer security in wireless communication systems.” 2016. Doctoral Dissertation, University of New South Wales. Accessed June 05, 2020. http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true.

MLA Handbook (7th Edition):

Liu, Chenxi. “Location-based physical layer security in wireless communication systems.” 2016. Web. 05 Jun 2020.

Vancouver:

Liu C. Location-based physical layer security in wireless communication systems. [Internet] [Doctoral dissertation]. University of New South Wales; 2016. [cited 2020 Jun 05]. Available from: http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true.

Council of Science Editors:

Liu C. Location-based physical layer security in wireless communication systems. [Doctoral Dissertation]. University of New South Wales; 2016. Available from: http://handle.unsw.edu.au/1959.4/57068 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42383/SOURCE02?view=true


University of New South Wales

10. Ali, Syed Taha. Security mechanisms for body sensor networks.

Degree: Electrical Engineering & Telecommunications, 2011, University of New South Wales

 Body sensor networks are a key component in the emerging trend towards personalised healthcare monitoring and the mobile health paradigm. These networks consist of miniaturized… (more)

Subjects/Keywords: Privacy; Body area networks; Security; Data forensics; Physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ali, S. T. (2011). Security mechanisms for body sensor networks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Ali, Syed Taha. “Security mechanisms for body sensor networks.” 2011. Doctoral Dissertation, University of New South Wales. Accessed June 05, 2020. http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true.

MLA Handbook (7th Edition):

Ali, Syed Taha. “Security mechanisms for body sensor networks.” 2011. Web. 05 Jun 2020.

Vancouver:

Ali ST. Security mechanisms for body sensor networks. [Internet] [Doctoral dissertation]. University of New South Wales; 2011. [cited 2020 Jun 05]. Available from: http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true.

Council of Science Editors:

Ali ST. Security mechanisms for body sensor networks. [Doctoral Dissertation]. University of New South Wales; 2011. Available from: http://handle.unsw.edu.au/1959.4/51658 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10325/SOURCE02?view=true


University of Waterloo

11. Abubaker, Radi. Channel Based Relay Attack Detection Protocol.

Degree: 2019, University of Waterloo

 A relay attack is a potentially devastating form of a man-in-the-middle attack, that can circumvent any challenge-response authentication protocol. A relay attack also has no… (more)

Subjects/Keywords: relay attack; channel state information; csi; physical layer security; physical-layer security; man-in the middle attack; mitm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abubaker, R. (2019). Channel Based Relay Attack Detection Protocol. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14691

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abubaker, Radi. “Channel Based Relay Attack Detection Protocol.” 2019. Thesis, University of Waterloo. Accessed June 05, 2020. http://hdl.handle.net/10012/14691.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abubaker, Radi. “Channel Based Relay Attack Detection Protocol.” 2019. Web. 05 Jun 2020.

Vancouver:

Abubaker R. Channel Based Relay Attack Detection Protocol. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/10012/14691.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abubaker R. Channel Based Relay Attack Detection Protocol. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/14691

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Edinburgh

12. Liu, Weigang. Enhancing physical layer security in wireless networks with cooperative approaches.

Degree: PhD, 2016, University of Edinburgh

 Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are… (more)

Subjects/Keywords: 621.382; physical layer security; convex optimization; stochastic geometry

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, W. (2016). Enhancing physical layer security in wireless networks with cooperative approaches. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/19565

Chicago Manual of Style (16th Edition):

Liu, Weigang. “Enhancing physical layer security in wireless networks with cooperative approaches.” 2016. Doctoral Dissertation, University of Edinburgh. Accessed June 05, 2020. http://hdl.handle.net/1842/19565.

MLA Handbook (7th Edition):

Liu, Weigang. “Enhancing physical layer security in wireless networks with cooperative approaches.” 2016. Web. 05 Jun 2020.

Vancouver:

Liu W. Enhancing physical layer security in wireless networks with cooperative approaches. [Internet] [Doctoral dissertation]. University of Edinburgh; 2016. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/1842/19565.

Council of Science Editors:

Liu W. Enhancing physical layer security in wireless networks with cooperative approaches. [Doctoral Dissertation]. University of Edinburgh; 2016. Available from: http://hdl.handle.net/1842/19565


University of Manchester

13. Alotaibi, Nafel Nahes A. Improving secrecy and spectral efficiency of wireless communications.

Degree: PhD, 2016, University of Manchester

 The current and future demand for wireless technology is increasing rapidlyin the era of Internet-of-things, information-shower, auto-drive vehicles andthe fifth generation of mobile communications. The… (more)

Subjects/Keywords: 621.382; physical layer security; spectral efficiency; phased antenna array; wireless communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, N. N. A. (2016). Improving secrecy and spectral efficiency of wireless communications. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621

Chicago Manual of Style (16th Edition):

Alotaibi, Nafel Nahes A. “Improving secrecy and spectral efficiency of wireless communications.” 2016. Doctoral Dissertation, University of Manchester. Accessed June 05, 2020. https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621.

MLA Handbook (7th Edition):

Alotaibi, Nafel Nahes A. “Improving secrecy and spectral efficiency of wireless communications.” 2016. Web. 05 Jun 2020.

Vancouver:

Alotaibi NNA. Improving secrecy and spectral efficiency of wireless communications. [Internet] [Doctoral dissertation]. University of Manchester; 2016. [cited 2020 Jun 05]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621.

Council of Science Editors:

Alotaibi NNA. Improving secrecy and spectral efficiency of wireless communications. [Doctoral Dissertation]. University of Manchester; 2016. Available from: https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.692621


NSYSU

14. Chiang, Tsung-Chi. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.

Degree: Master, Communications Engineering, 2018, NSYSU

 In recent years, wireless sensor networks are widely used because they comprised a large number of low-cost, low-power and miniature sensors. In wireless sensor networks,… (more)

Subjects/Keywords: Wireless Sensor Networks; Eavesdropper; Distributed Detection; Physical-Layer Security; Channel Selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiang, T. (2018). Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiang, Tsung-Chi. “Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.” 2018. Thesis, NSYSU. Accessed June 05, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiang, Tsung-Chi. “Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.” 2018. Web. 05 Jun 2020.

Vancouver:

Chiang T. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Jun 05]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiang T. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

15. Tseng, Shih-Ming. Physical-Layer Security Design for Distributed Detection with Attackers.

Degree: Master, Communications Engineering, 2018, NSYSU

 Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the… (more)

Subjects/Keywords: wireless sensor networks; physical-layer security; eavedroppers; attackers; distributed detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2018). Physical-Layer Security Design for Distributed Detection with Attackers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Thesis, NSYSU. Accessed June 05, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Web. 05 Jun 2020.

Vancouver:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Jun 05]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Ko, Miyong. Wireless Physical-Layer Security Performance of Uwb systems.

Degree: MS, Electrical & Computer Engineering, 2011, University of Massachusetts

  Traditionally, spread-spectrum systems have been employed to provide low probability-of-intercept (LPI) and low probability-of-detection (LPD) performances at the physical layer, but the messages transmitted… (more)

Subjects/Keywords: UWB; security; wireless; physical layer; Signal Processing; Systems and Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ko, M. (2011). Wireless Physical-Layer Security Performance of Uwb systems. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/689

Chicago Manual of Style (16th Edition):

Ko, Miyong. “Wireless Physical-Layer Security Performance of Uwb systems.” 2011. Masters Thesis, University of Massachusetts. Accessed June 05, 2020. https://scholarworks.umass.edu/theses/689.

MLA Handbook (7th Edition):

Ko, Miyong. “Wireless Physical-Layer Security Performance of Uwb systems.” 2011. Web. 05 Jun 2020.

Vancouver:

Ko M. Wireless Physical-Layer Security Performance of Uwb systems. [Internet] [Masters thesis]. University of Massachusetts; 2011. [cited 2020 Jun 05]. Available from: https://scholarworks.umass.edu/theses/689.

Council of Science Editors:

Ko M. Wireless Physical-Layer Security Performance of Uwb systems. [Masters Thesis]. University of Massachusetts; 2011. Available from: https://scholarworks.umass.edu/theses/689


Australian National University

17. He, Biao. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .

Degree: 2016, Australian National University

 The current research on physical layer security is far from implementations in practical networks, arguably due to impractical assumptions in the literature and the limited… (more)

Subjects/Keywords: physical layer security; wireless communications; secrecy outage probability; secrecy capacity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

He, B. (2016). Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . (Thesis). Australian National University. Retrieved from http://hdl.handle.net/1885/104995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

He, Biao. “Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .” 2016. Thesis, Australian National University. Accessed June 05, 2020. http://hdl.handle.net/1885/104995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

He, Biao. “Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .” 2016. Web. 05 Jun 2020.

Vancouver:

He B. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . [Internet] [Thesis]. Australian National University; 2016. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/1885/104995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

He B. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . [Thesis]. Australian National University; 2016. Available from: http://hdl.handle.net/1885/104995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Taha, Hasan. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.

Degree: 2018, University of Manchester

Security and power consumption are the first critical concerns in many wireless networks as part of the fast progress in a variety of applications over… (more)

Subjects/Keywords: Physical Layer Security

…reasons and ambition towards the physical layer security, we proposed four approaches based on… …physical layer security are based on the information theoretic model introduced by Shannon in… …signal propagation intrinsic randomness. The physical layer security approach has become a… …establish security services, secret key exchange and authentication, at the physical layer in the… …methods, especially for the secret key problem. • Proposing physical layer based security… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, H. (2018). PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845

Chicago Manual of Style (16th Edition):

Taha, Hasan. “PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.” 2018. Doctoral Dissertation, University of Manchester. Accessed June 05, 2020. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845.

MLA Handbook (7th Edition):

Taha, Hasan. “PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.” 2018. Web. 05 Jun 2020.

Vancouver:

Taha H. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2020 Jun 05]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845.

Council of Science Editors:

Taha H. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. [Doctoral Dissertation]. University of Manchester; 2018. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845


University of New South Wales

19. Javali, Chitra. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.

Degree: Computer Science & Engineering, 2017, University of New South Wales

 The tremendous development in wireless technology has lead to accessing abundant information at one's convenient location using hand-held and personal devices. Though the wireless medium… (more)

Subjects/Keywords: Location Proof; Physical layer security; Authentication; Secure pairing; Secret key generation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Javali, C. (2017). Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Javali, Chitra. “Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.” 2017. Doctoral Dissertation, University of New South Wales. Accessed June 05, 2020. http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true.

MLA Handbook (7th Edition):

Javali, Chitra. “Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.” 2017. Web. 05 Jun 2020.

Vancouver:

Javali C. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2020 Jun 05]. Available from: http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true.

Council of Science Editors:

Javali C. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true


Rice University

20. Yeh, Chia-Yi. Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach.

Degree: MS, Engineering, 2018, Rice University

 Massive MIMO systems have the potential for preventing passive eavesdropping as the signal transmitted by a large antenna array becomes highly focused. Prior works showed… (more)

Subjects/Keywords: massive MIMO; passive eavesdropping; measurements; physical layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yeh, C. (2018). Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach. (Masters Thesis). Rice University. Retrieved from http://hdl.handle.net/1911/105588

Chicago Manual of Style (16th Edition):

Yeh, Chia-Yi. “Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach.” 2018. Masters Thesis, Rice University. Accessed June 05, 2020. http://hdl.handle.net/1911/105588.

MLA Handbook (7th Edition):

Yeh, Chia-Yi. “Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach.” 2018. Web. 05 Jun 2020.

Vancouver:

Yeh C. Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach. [Internet] [Masters thesis]. Rice University; 2018. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/1911/105588.

Council of Science Editors:

Yeh C. Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach. [Masters Thesis]. Rice University; 2018. Available from: http://hdl.handle.net/1911/105588


Georgia Tech

21. Harper, Andrew. Interference design in wireless communication systems.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 Interference in wireless communication systems is generally thought of as being produced by an outside, uncontrolled source. With this philosophy, interference must be accounted for… (more)

Subjects/Keywords: Interference; Wireless communication; Physical layer security; Joint radar-communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harper, A. (2016). Interference design in wireless communication systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58167

Chicago Manual of Style (16th Edition):

Harper, Andrew. “Interference design in wireless communication systems.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 05, 2020. http://hdl.handle.net/1853/58167.

MLA Handbook (7th Edition):

Harper, Andrew. “Interference design in wireless communication systems.” 2016. Web. 05 Jun 2020.

Vancouver:

Harper A. Interference design in wireless communication systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/1853/58167.

Council of Science Editors:

Harper A. Interference design in wireless communication systems. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/58167


The Ohio State University

22. Basciftci, Yuksel O, Basciftci. Private and Secure Data Communication: Information Theoretic Approach.

Degree: PhD, Electrical and Computer Engineering, 2016, The Ohio State University

 Wireless networks flourishing worldwide enable online services, such as social networks and search engines to serve huge number of users and to collect large amount… (more)

Subjects/Keywords: Electrical Engineering; Data privacy, data security, information theory, physical layer security, wireless communiation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basciftci, Yuksel O, B. (2016). Private and Secure Data Communication: Information Theoretic Approach. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249

Chicago Manual of Style (16th Edition):

Basciftci, Yuksel O, Basciftci. “Private and Secure Data Communication: Information Theoretic Approach.” 2016. Doctoral Dissertation, The Ohio State University. Accessed June 05, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249.

MLA Handbook (7th Edition):

Basciftci, Yuksel O, Basciftci. “Private and Secure Data Communication: Information Theoretic Approach.” 2016. Web. 05 Jun 2020.

Vancouver:

Basciftci, Yuksel O B. Private and Secure Data Communication: Information Theoretic Approach. [Internet] [Doctoral dissertation]. The Ohio State University; 2016. [cited 2020 Jun 05]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249.

Council of Science Editors:

Basciftci, Yuksel O B. Private and Secure Data Communication: Information Theoretic Approach. [Doctoral Dissertation]. The Ohio State University; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249


Virginia Tech

23. Shahriar, Chowdhury MR. Resilient Waveform Design for OFDM-MIMO Communication Systems.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto'… (more)

Subjects/Keywords: Physical-Layer Security; Communications Security; OFDM; MIMO; Jamming; Antijam; Equalization Attack; Pilot Attack; LTE; WiMAX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahriar, C. M. (2015). Resilient Waveform Design for OFDM-MIMO Communication Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/56973

Chicago Manual of Style (16th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Doctoral Dissertation, Virginia Tech. Accessed June 05, 2020. http://hdl.handle.net/10919/56973.

MLA Handbook (7th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Web. 05 Jun 2020.

Vancouver:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/10919/56973.

Council of Science Editors:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/56973


University of California – Irvine

24. ZAMAN, IMAMUZ. Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link.

Degree: Electrical and Computer Engineering, 2018, University of California – Irvine

 Point to Point Optical Link (PPOL) and Inter Vehicular Visible Light Communications (IVVLC) as susceptible to many security threats including jamming, eavesdropping, interception and physical(more)

Subjects/Keywords: Electrical engineering; Communication; Optical Fiber; Physical Layer Security; PMD; Security; Symmetric Key

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ZAMAN, I. (2018). Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/81b411vt

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

ZAMAN, IMAMUZ. “Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link.” 2018. Thesis, University of California – Irvine. Accessed June 05, 2020. http://www.escholarship.org/uc/item/81b411vt.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

ZAMAN, IMAMUZ. “Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link.” 2018. Web. 05 Jun 2020.

Vancouver:

ZAMAN I. Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link. [Internet] [Thesis]. University of California – Irvine; 2018. [cited 2020 Jun 05]. Available from: http://www.escholarship.org/uc/item/81b411vt.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

ZAMAN I. Physical Layer Security Key Generation for Fiber Optic and Inter-Vehicular Optical Communication Link. [Thesis]. University of California – Irvine; 2018. Available from: http://www.escholarship.org/uc/item/81b411vt

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Dayton

25. Yu, Jiahui. Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications.

Degree: MS(M.S.), Electrical and Computer Engineering, 2019, University of Dayton

 The Internet-of-Things (IoT) will connect different types of cyber physical systems that are supported by different wireless transmission technologies, e.g., Wi-Fi, ZigBee, etc. However, the… (more)

Subjects/Keywords: Computer Engineering; Physical layer security; Seamless IoT; Authentication; Security parameter generation; Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, J. (2019). Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications. (Masters Thesis). University of Dayton. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975

Chicago Manual of Style (16th Edition):

Yu, Jiahui. “Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications.” 2019. Masters Thesis, University of Dayton. Accessed June 05, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975.

MLA Handbook (7th Edition):

Yu, Jiahui. “Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications.” 2019. Web. 05 Jun 2020.

Vancouver:

Yu J. Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications. [Internet] [Masters thesis]. University of Dayton; 2019. [cited 2020 Jun 05]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975.

Council of Science Editors:

Yu J. Physical-layer Security Based Authentication and Key Generation for Seamless IoT Communications. [Masters Thesis]. University of Dayton; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576178965071975


NSYSU

26. Song, Hui-Xuan. Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers.

Degree: Master, Communications Engineering, 2017, NSYSU

 In this thesis, a scheme using jamming signal is adopted to improve the physical- layer security of a decode-and- forward cooperated relay network in the… (more)

Subjects/Keywords: outage probability; decode- and-forward; relay selection; cooperated network; physical-layer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, H. (2017). Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Song, Hui-Xuan. “Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers.” 2017. Thesis, NSYSU. Accessed June 05, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Song, Hui-Xuan. “Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers.” 2017. Web. 05 Jun 2020.

Vancouver:

Song H. Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers. [Internet] [Thesis]. NSYSU; 2017. [cited 2020 Jun 05]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Song H. Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621117-094936

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

27. Amariucai, George Traian. Physical layer security in wireless networks: intelligent jamming and eavesdropping.

Degree: PhD, Electrical and Computer Engineering, 2009, Louisiana State University

 This work aims at addressing two critical security issues residing in the physical layer of wireless networks, namely intelligent jamming and eavesdropping. In the first… (more)

Subjects/Keywords: BMW scheme; physical layer security; wiretap channel with feedback; jamming; active eavesdropper; wireless networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amariucai, G. T. (2009). Physical layer security in wireless networks: intelligent jamming and eavesdropping. (Doctoral Dissertation). Louisiana State University. Retrieved from etd-05282009-075025 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2244

Chicago Manual of Style (16th Edition):

Amariucai, George Traian. “Physical layer security in wireless networks: intelligent jamming and eavesdropping.” 2009. Doctoral Dissertation, Louisiana State University. Accessed June 05, 2020. etd-05282009-075025 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2244.

MLA Handbook (7th Edition):

Amariucai, George Traian. “Physical layer security in wireless networks: intelligent jamming and eavesdropping.” 2009. Web. 05 Jun 2020.

Vancouver:

Amariucai GT. Physical layer security in wireless networks: intelligent jamming and eavesdropping. [Internet] [Doctoral dissertation]. Louisiana State University; 2009. [cited 2020 Jun 05]. Available from: etd-05282009-075025 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2244.

Council of Science Editors:

Amariucai GT. Physical layer security in wireless networks: intelligent jamming and eavesdropping. [Doctoral Dissertation]. Louisiana State University; 2009. Available from: etd-05282009-075025 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2244


Texas A&M University

28. El-Halabi, Mustapha. Physical-Layer Security: Wide-band Communications & Role of Known Interference.

Degree: 2013, Texas A&M University

 Data security is of such paramount importance that security measures have been implemented across all layers of a communication network. One layer at which security(more)

Subjects/Keywords: Physical layer security; wiretap channel; secrecy capacity; capacity per unit cost; linear deterministic model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

El-Halabi, M. (2013). Physical-Layer Security: Wide-band Communications & Role of Known Interference. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/151822

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Thesis, Texas A&M University. Accessed June 05, 2020. http://hdl.handle.net/1969.1/151822.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Web. 05 Jun 2020.

Vancouver:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Internet] [Thesis]. Texas A&M University; 2013. [cited 2020 Jun 05]. Available from: http://hdl.handle.net/1969.1/151822.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Thesis]. Texas A&M University; 2013. Available from: http://hdl.handle.net/1969.1/151822

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Talat, Rehan. Enhancing Secrecy via Exploring Randomness in the Wireless Physical Layer.

Degree: MS, Electrical & Computer Engineering, 2013, University of Massachusetts

  In order to establish a secure connections in the wireless environment, cryptographic methods may require an exchange of a key or secret. Fortunately, the… (more)

Subjects/Keywords: wireless communication; secrecy; antenna radiation variation; multi-path fading; physical layer; security; Systems and Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Talat, R. (2013). Enhancing Secrecy via Exploring Randomness in the Wireless Physical Layer. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/1168

Chicago Manual of Style (16th Edition):

Talat, Rehan. “Enhancing Secrecy via Exploring Randomness in the Wireless Physical Layer.” 2013. Masters Thesis, University of Massachusetts. Accessed June 05, 2020. https://scholarworks.umass.edu/theses/1168.

MLA Handbook (7th Edition):

Talat, Rehan. “Enhancing Secrecy via Exploring Randomness in the Wireless Physical Layer.” 2013. Web. 05 Jun 2020.

Vancouver:

Talat R. Enhancing Secrecy via Exploring Randomness in the Wireless Physical Layer. [Internet] [Masters thesis]. University of Massachusetts; 2013. [cited 2020 Jun 05]. Available from: https://scholarworks.umass.edu/theses/1168.

Council of Science Editors:

Talat R. Enhancing Secrecy via Exploring Randomness in the Wireless Physical Layer. [Masters Thesis]. University of Massachusetts; 2013. Available from: https://scholarworks.umass.edu/theses/1168

30. Wang, Lihao. Addressing/Exploiting Transceiver Imperfections in Wireless Communication Systems.

Degree: MS, Electrical & Computer Engineering, 2011, University of Massachusetts

  This thesis consists of two research projects on wireless communication systems. In the first project, we propose a fast inphase and quadrature (I/Q) imbalance… (more)

Subjects/Keywords: I/Q Imbalance; Physical Layer Security; Digital Communications and Networking; Signal Processing; Systems and Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, L. (2011). Addressing/Exploiting Transceiver Imperfections in Wireless Communication Systems. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/735

Chicago Manual of Style (16th Edition):

Wang, Lihao. “Addressing/Exploiting Transceiver Imperfections in Wireless Communication Systems.” 2011. Masters Thesis, University of Massachusetts. Accessed June 05, 2020. https://scholarworks.umass.edu/theses/735.

MLA Handbook (7th Edition):

Wang, Lihao. “Addressing/Exploiting Transceiver Imperfections in Wireless Communication Systems.” 2011. Web. 05 Jun 2020.

Vancouver:

Wang L. Addressing/Exploiting Transceiver Imperfections in Wireless Communication Systems. [Internet] [Masters thesis]. University of Massachusetts; 2011. [cited 2020 Jun 05]. Available from: https://scholarworks.umass.edu/theses/735.

Council of Science Editors:

Wang L. Addressing/Exploiting Transceiver Imperfections in Wireless Communication Systems. [Masters Thesis]. University of Massachusetts; 2011. Available from: https://scholarworks.umass.edu/theses/735

[1] [2] [3] [4]

.