Difference between revisions of "Main Page"
Line 1: | Line 1: | ||
− | < | + | <div id="mainpage"> |
+ | {| style="border-collapse:collapse; width:100%;" | ||
+ | | colspan="2" style="padding:0;" | | ||
− | + | <!-- Willkommen --> | |
+ | <div id="mainpagewelcome" class="hauptseite-oben"> | ||
+ | == Welcome to PLS Wiki == | ||
+ | <div class="inhalt" style="text-align:left;"> | ||
+ | the research oriented knowledgebase about wireless physical-layer security and physical-layer security in general. | ||
+ | Working together with you and other international researchers, we hopefully can create an highly informative database, which pools international scientific research. We will provide summaries of different theoretical attack scenarios and, if already performed, information about the evaluation in an ideal and/or realistic environment. | ||
− | == | + | An overview of conceivable attacks can be modeled in an attack tree, which was introduced by Bruce Schneier in 1999. |
− | + | <div style="text-align:center;"> | |
− | + | [[File:Attacktree.png|1000px]] | |
− | + | ||
− | + | ||
− | + | </div> | |
+ | |||
+ | |||
+ | |- | ||
+ | | style="padding:0; vertical-align:top; width:50%;" | | ||
+ | |||
+ | <!-- Primary Artikles concerning the topic --> | ||
+ | <div id="hauptseite-primary" class="hauptseite-links"> | ||
+ | == Basic Knowledge == | ||
+ | <div class="inhalt" id="mf-tfa" title="Primäre Artikel"> | ||
+ | |||
+ | </div> | ||
+ | At this position there will be a table of links concerning the essentials of PLS. Further details can be found as well in the links on the particular pages as with the usage of the search function | ||
+ | </div> | ||
+ | |||
+ | |||
+ | |||
+ | | style="padding:0; vertical-align:top; width:50%;" | | ||
+ | |||
+ | <!-- Aktuelle artikel --> | ||
+ | <div id="hauptseite-content" class="hauptseite-rechts"> | ||
+ | == Table of Content == | ||
+ | <div class="content" id="mf-itn" title="Table of Content"> | ||
+ | [[Key Extraction Principles]] | ||
+ | |||
+ | [[Recovery Attack on Channel Correlation Information]] | ||
+ | |||
+ | [[Attacks on Quantization]] | ||
+ | |||
+ | [[Attacks on Key Reconciliation]] | ||
+ | |||
+ | [[Attacks on Privacy Amplification]] | ||
+ | |||
+ | [[Syndrome Decoding]] | ||
+ | |||
+ | </div> | ||
+ | |||
+ | |||
+ | |||
+ | |- | ||
+ | | colspan="2" style="padding:0;" | | ||
+ | |||
+ | |||
+ | |} | ||
+ | |||
+ | |||
+ | </div> | ||
+ | [[Kategorie:Wikipedia:Hauptseite| ]] <!-- Wird über einen Eintrag in der common.css ausgeblendet --> |
Revision as of 13:45, 9 October 2017
Welcome to PLS Wikithe research oriented knowledgebase about wireless physical-layer security and physical-layer security in general. Working together with you and other international researchers, we hopefully can create an highly informative database, which pools international scientific research. We will provide summaries of different theoretical attack scenarios and, if already performed, information about the evaluation in an ideal and/or realistic environment. An overview of conceivable attacks can be modeled in an attack tree, which was introduced by Bruce Schneier in 1999.
| |
Basic KnowledgeAt this position there will be a table of links concerning the essentials of PLS. Further details can be found as well in the links on the particular pages as with the usage of the search function
|
|
|