Secret key generation in correlated multi-dimensional Gaussian channels
暂无分享,去创建一个
[1] Nirmal K. Bose,et al. Asymptotic Eigenvalue Distribution of Block-Toeplitz Matrices , 1998, IEEE Trans. Inf. Theory.
[2] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[3] Stark C. Draper,et al. Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[4] Boualem Boashash,et al. Time-Frequency Signal Analysis and Processing , 2002 .
[5] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[6] Mudhakar Srivatsa,et al. Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.
[7] Jon W. Wallace. Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.
[8] J. D. Parsons,et al. The Mobile Radio Propagation Channel , 1991 .
[9] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[10] Moe Z. Win,et al. The role of aggregate interference on intrinsic network secrecy , 2012, 2012 IEEE International Conference on Communications (ICC).
[11] Stark C. Draper,et al. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness , 2010, 2010 IEEE International Symposium on Information Theory.
[12] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[13] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[14] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[15] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[16] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.