Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
暂无分享,去创建一个
Stephen W. Neville | Asghar Beheshti | Michael L. McGuire | Masoud Ghoreishi Madiseh | S. Neville | M. McGuire | A. Beheshti | M. G. Madiseh
[1] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[2] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[3] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[4] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[5] Desmond P. Taylor,et al. A Statistical Model for Indoor Multipath Propagation , 2007 .
[6] Rudolf Ahlswede,et al. Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.
[7] D. Cheung,et al. Spatial correlation of UWB signals in a home environment , 2002, 2002 IEEE Conference on Ultra Wideband Systems and Technologies (IEEE Cat. No.02EX580).
[8] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[9] J. Foerster,et al. Channel modeling sub-committee report final , 2002 .
[10] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[11] J. Muramatu. Secret key agreement from correlated source outputs using LDPC matrices , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[12] Ueli Maurer,et al. Protocols for Secret Key Agreement by Public Discussion Based on Common Information , 1992, CRYPTO.
[13] Ali Shahzadi,et al. Secret key Capacity for Wireless Nakagami and Suzuki Fading Channels , 2007 .
[14] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[15] John G. Proakis,et al. Digital Communications , 1983 .
[16] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[17] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security - Part I: Theoretical Aspects , 2006, ArXiv.
[18] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[19] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security - Part II: Practical Implementation , 2006, ArXiv.
[20] G.S. Smith,et al. A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.
[21] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[22] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[23] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.