Improving Quantization for Channel Reciprocity based Key Generation
暂无分享,去创建一个
Eduard A. Jorswieck | Horst Hellbrück | Thorsten Strufe | Mathias Pelka | Carsten Rudolf Janda | Elke Franz | Paul Walther
[1] Steven W. Smith,et al. The Scientist and Engineer's Guide to Digital Signal Processing , 1997 .
[2] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[3] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[4] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[5] S. Gezici,et al. Ranging in the IEEE 802.15.4a Standard , 2006, 2006 IEEE Annual Wireless and Microwave Technology Conference.
[6] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[7] Wenliang Du,et al. Key Generation From Wireless Channels , 2013 .
[8] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.
[9] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[10] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[11] Christof Paar,et al. Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .
[12] Mohamed R. Mahfouz,et al. Adaptive leading-edge detection in UWB indoor localization , 2010, 2010 IEEE Radio and Wireless Symposium (RWS).
[13] Christof Paar,et al. Exploiting the Physical Environment for Securing the Internet of Things , 2015, NSPW '15.
[14] T. Ohira,et al. Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme , 2005, The European Conference on Wireless Technology, 2005..
[15] Renato Renner,et al. An intuitive proof of the data processing inequality , 2011, Quantum Inf. Comput..
[16] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[17] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[18] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[19] Michael Randolph Garey,et al. The complexity of the generalized Lloyd - Max problem , 1982, IEEE Trans. Inf. Theory.
[20] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[21] Junqing Zhang,et al. Secure key generation from OFDM subcarriers' channel responses , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[22] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[23] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[24] Chung Chan,et al. Multivariate Mutual Information Inspired by Secret-Key Agreement , 2015, Proceedings of the IEEE.
[25] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[26] J. Kinney,et al. Equitability, mutual information, and the maximal information coefficient , 2013, Proceedings of the National Academy of Sciences.