Secret key generation based on two-way randomness for TDD-SISO system
暂无分享,去创建一个
Shengjun Zhang | Liang Jin | Zhou Zhong | Yangming Lou | Liang Jin | Zhou Zhong | Yangming Lou | Shengjun Zhang
[1] I. Motivation,et al. Secret-Key Agreement Over Unauthenticated Public Channels—Part III: Privacy Amplification , 2003 .
[2] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[3] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.
[4] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels II: the simulatability condition , 2003, IEEE Trans. Inf. Theory.
[5] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[6] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[7] Matthieu R. Bloch,et al. Semi-Blind Key-Agreement over MIMO Fading Channels , 2013, IEEE Transactions on Communications.
[8] Lou Yangming,et al. Secret key generation scheme based on MIMO received signal spaces}{Secret key generation scheme based on MIMO received signal spaces , 2017 .
[9] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.
[10] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.
[11] Mohamed-Slim Alouini,et al. Secret Key Agreement: Fundamental Limits and Practical Challenges , 2017, IEEE Wireless Communications.
[12] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[13] Erdal Arikan,et al. Systematic Polar Coding , 2011, IEEE Communications Letters.
[14] Ashish Khisti,et al. Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion , 2016, IEEE Transactions on Information Theory.
[15] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.