Secure Array Synthesis
暂无分享,去创建一个
[1] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[2] Michael A. Jensen,et al. Mutual coupling in MIMO wireless systems: a rigorous network theory analysis , 2004, IEEE Transactions on Wireless Communications.
[3] Constantine A. Balanis,et al. Antenna Theory: Analysis and Design , 1982 .
[4] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[5] Walid Saad,et al. On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.
[6] Stephen P. Boyd,et al. Determinant Maximization with Linear Matrix Inequality Constraints , 1998, SIAM J. Matrix Anal. Appl..
[7] Anton van den Hengel,et al. Semidefinite Programming , 2014, Computer Vision, A Reference Guide.
[8] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[9] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[10] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[11] Mounir Ghogho,et al. Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation , 2011, Phys. Commun..
[12] Michael A. Jensen,et al. Key Establishment Employing Reconfigurable Antennas: Impact of Antenna Complexity , 2014, IEEE Transactions on Wireless Communications.
[13] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[14] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[15] Stark C. Draper,et al. Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage , 2013, IEEE Journal on Selected Areas in Communications.
[16] Björn E. Ottersten,et al. Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.
[17] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[18] Matthew R. McKay,et al. Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.
[19] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[20] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[21] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.