A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation
暂无分享,去创建一个
Jonathan Rodriguez | Victor Sucasas | Saud Althunibat | Jonathan Rodriguez | S. Althunibat | V. Sucasas
[1] Dieter Hogrefe,et al. An Optimal Guard-Intervals Based Mechanism for Key Generation from Multipath Wireless Channels , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[2] Sri Parameswaran,et al. Reconfigurable Convolutional Codec for Physical Layer Communication Security Application , 2014, 2014 IEEE Military Communications Conference.
[3] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[4] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[5] Liang Tang,et al. Dynamic reconfigurable puncturing for secure wireless communication , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[6] Jin Zhang,et al. MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation , 2015, IEEE Transactions on Information Forensics and Security.
[7] G.S. Smith,et al. A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.
[8] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[9] Ranjan K. Mallik,et al. Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.
[10] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[11] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[12] Alexandros G. Fragkiadakis,et al. Lightweight and secure encryption using channel measurements , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).
[13] Srdjan Capkun,et al. Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.
[14] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[15] Mohammad Iftekhar Husain,et al. CD-PHY: Physical layer security in wireless networks through constellation diversity , 2011, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[16] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[17] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[18] Yuanyuan Gao,et al. One transmission scheme based on variable MSK modulator for wireless physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[19] G. Wornell,et al. Secure Transmission with Multiple Antennas: The MIMOME Channel , 2008 .
[20] Emre Telatar,et al. Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..
[21] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[22] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[23] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[24] Milica Stojanovic,et al. Analysis of the impact of channel estimation errors on the performance of a decision-feedback equalizer in fading multipath channels , 1995, IEEE Trans. Commun..