| 查看: 895 | 回复: 2 | ||
| 【悬赏金币】回答本帖问题,作者zxm1983将赠送您 80 个金币 | ||
[求助]
Research on Modulation Algorithm Based on Physical Layer Encryption论文检索 已有1人参与
|
||
Research on Modulation Algorithm Based on Physical Layer Encryption国际学术会议,请问这个会议的EI论文检索了吗?大概是2018年7月左右召开的。 |
» 猜你喜欢
什么是人一生最重要的?
已经有6人回复
为什么中国大学工科教授们水了那么多所谓的顶会顶刊,但还是做不出宇树机器人?
已经有11人回复
网上报道青年教师午睡中猝死、熬夜猝死的越来越多,主要哪些原因引起的?
已经有9人回复
【博士招生】太原理工大学2026化工博士
已经有5人回复
280求调剂
已经有3人回复
面上可以超过30页吧?
已经有11人回复
版面费该交吗
已经有15人回复
体制内长辈说体制内绝大部分一辈子在底层,如同你们一样大部分普通教师忙且收入低
已经有18人回复
wpq113
至尊木虫 (著名写手)
- 应助: 23 (小学生)
- 金币: 21546.8
- 散金: 9
- 红花: 6
- 沙发: 2
- 帖子: 1985
- 在线: 1714.4小时
- 虫号: 328579
- 注册: 2007-03-21
- 专业: 计算机应用技术
【答案】应助回帖
|
Research on modulation algorithm based on physical layer encryption Li, Xiang 1 ; Zhang, Yueyong 1 Source: Lecture Notes in Electrical Engineering, v 517, p 1046-1054, 2020, Communications, Signal Processing, and Systems - Proceedings of the 2018 CSPS Volume 3: Systems; ISSN: 18761100, E-ISSN: 18761119; ISBN-13: 9789811365072; DOI: 10.1007/978-981-13-6508-9_127; Conference: International Conference on Communications, Signal Processing, and Systems, CSPS 2018, July 14, 2018 - July 16, 2018; Publisher: Springer Verlag Author affiliation : 1 College of Computer and Information Engineering, Tianjin Normal University, Tianjin; 300387, China Abstract: Communication has become a very important part of people’s work and life. Wireless communication technology has the characteristics of low cost, good scalability, and easy use, but it is vulnerable to eavesdropping and other security threats, and eavesdroppers illegally receive through wireless channels. Traditional wireless communication system security methods need to be implemented at the upper layer through authentication and cryptographic techniques. In recent years, as an important complement to traditional security mechanisms, information theory security principles, transmission signal security technologies, spread spectrum and frequency hopping encryption technologies, and channel coding Research on physical layer security technologies such as encryption technology and modulation encryption can effectively protect information during wireless transmission and prevent eavesdroppers from illegally receiving information. © Springer Nature Singapore Pte Ltd. 2020. (10 refs) Main heading: Cryptography Controlled terms: Information theory - Modulation - Network layers - Secure communication - Security systems Uncontrolled terms: Cryptographic techniques - Encryption technologies - Physical layer security - Physical layers - Wireless communication system - Wireless communication technology - Wireless communications - Wireless transmissions Classification code: 716.1 Information Theory and Signal Processing - 723 Computer Software, Data Handling and Applications - 914.1 Accidents and Accident Prevention Database: Compendex |
2楼2020-07-06 09:15:09
edgexjy
铁杆木虫 (知名作家)
队长
- 应助: 39 (小学生)
- 金币: 16790.1
- 散金: 2957
- 红花: 57
- 沙发: 3
- 帖子: 6018
- 在线: 294.9小时
- 虫号: 642479
- 注册: 2008-10-31
- 专业: 中国近代史、现代史

3楼2020-07-13 16:49:39













回复此楼