Impact of Realistic Propagation Conditions on Reciprocity-Based Secret-Key Capacity
暂无分享,去创建一个
[1] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[2] Trung-Hien Nguyen,et al. CSI-based versus RSS-based Secret-Key Generation under Correlated Eavesdropping , 2020 .
[3] Gordon L. Stüber. Principles of mobile communication , 1996 .
[4] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[5] Stark C. Draper,et al. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness , 2010, 2010 IEEE International Symposium on Information Theory.
[6] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[7] Don H. Johnson,et al. Array Signal Processing: Concepts and Techniques , 1993 .
[8] Klaus I. Pedersen,et al. Power azimuth spectrum in outdoor environments , 1997 .
[9] Aydin Sezgin,et al. The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[10] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[11] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.
[12] Alexandre J. Pierrot,et al. Experimental aspects of secret key generation in indoor wireless environments , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[13] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[14] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.
[15] Liesbet Van der Perre,et al. Modeling the channel time-variance for fixed wireless communications , 2002, IEEE Communications Letters.
[16] Xiaodai Dong,et al. Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.
[17] Raymond W. Yeung,et al. A new outlook of Shannon's information measures , 1991, IEEE Trans. Inf. Theory.
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Matthieu Bloch,et al. Secret Sharing over Fast-Fading MIMO Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[20] Junqing Zhang,et al. On the Key Generation From Correlated Wireless Channels , 2017, IEEE Communications Letters.
[21] Gregory D. Durgin,et al. Space-Time Wireless Channels , 2002 .
[22] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[23] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[24] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[25] Eduard A. Jorswieck,et al. Secret key generation from reciprocal spatially correlated MIMO channels , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).