MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Physical Layer Security for Internet of Things
Physical Layer Security for Internet of Things
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Physical Layer Security for Internet of Things
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Physical Layer Security for Internet of Things
Physical Layer Security for Internet of Things

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Physical Layer Security for Internet of Things
Physical Layer Security for Internet of Things
Journal Article

Physical Layer Security for Internet of Things

2019
Request Book From Autostore and Choose the Collection Method
Overview
To this end, Xiang Li et al. propose a secure and compliant continuous assessment framework (SCCAF), to facilitate cloud service customers to select an optimal cloud service provider (CSP) which satisfies their desired security requirements. [...]it also enables cloud service customers to evaluate the compliance of the selected CSP in the process of using cloud services. An energy-efficient transmission scheme (EET) is proposed, which can be suitable for the resource-constrained devices and applications in IoT communication. [...]the secrecy outage probability (SOP) and secure energy efficiency (SEE) of different transmission strategies are derived, which contributes to the design of energy-efficient secure transmission. Unidirectional Visible Light Communication (VLC) is applied to the over-the-air reprogramming and commercial off-the-shelf devices such as smartphone and sensor node are used to improve applicability. [...]a reprogramming approach named ReVLC is proposed.