Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks
暂无分享,去创建一个
[1] Yue Rong,et al. Optimality of diagonalization of multi-hop MIMO relays , 2009, IEEE Transactions on Wireless Communications.
[2] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Heng Zhou,et al. Secret Key Generation in the Two-Way Relay Channel With Active Attackers , 2014, IEEE Transactions on Information Forensics and Security.
[4] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Yingbo Hua,et al. Joint Source and Relay Optimization for a Non-Regenerative MIMO Relay , 2006, Fourth IEEE Workshop on Sensor Array and Multichannel Processing, 2006..
[7] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[9] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[11] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[12] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Amitava Ghosh,et al. Multi-Antenna Systems for LTE eNodeB , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.
[14] Satoshi Nagata,et al. MIMO and CoMP in LTE-Advanced , 2010 .
[15] Balasubramaniam Natarajan,et al. MIMO-Based Secret Key Generation Strategies: Rate Analysis , 2014, Int. J. Mob. Comput. Multim. Commun..
[16] Wenliang Du,et al. PHY-based cooperative key generation in wireless networks , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[18] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.
[19] M. Debbah,et al. Wireless physical-layer security: The challenges ahead , 2009, 2009 International Conference on Advanced Technologies for Communications.
[20] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[21] Armin Wittneben,et al. Power Allocation Schemes for Amplify-and-Forward MIMO-OFDM Relay Links , 2007, IEEE Transactions on Wireless Communications.
[22] Alexandre J. Pierrot,et al. Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.
[23] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[24] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[25] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[26] Xiang Cheng,et al. Cooperative MIMO channel models: A survey , 2010, IEEE Communications Magazine.
[27] John M. Cioffi,et al. Uniform power allocation in MIMO channels: a game-theoretic approach , 2003, IEEE Transactions on Information Theory.
[28] Balasubramaniam Natarajan,et al. Relay-based secret key generation in LTE-A , 2014, 2014 IEEE Conference on Communications and Network Security.