Opportunistic Secrecy with a Strict Delay Constraint
暂无分享,去创建一个
[1] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[2] Aylin Yener,et al. The role of channel states in secret key generation , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[3] Vinod M. Prabhakaran,et al. Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.
[4] Giuseppe Caire,et al. Optimum power control over fading channels , 1999, IEEE Trans. Inf. Theory.
[5] Moustafa Youssef,et al. ARQ secrecy: From theory to practice , 2009, 2009 IEEE Information Theory Workshop.
[6] A. Agrawala,et al. On the Optimality of WLAN Location Determination Systems , 2003 .
[7] Ness B. Shroff,et al. Joint Power and Secret Key Queue Management for Delay Limited Secure Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[8] George T. Amariucai,et al. Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme , 2010, ISIT.
[9] Shlomo Shamai,et al. Information theoretic considerations for cellular mobile radio , 1994 .
[10] Rudi van Drunen,et al. Wireless Networks , 2007, USENIX Annual Technical Conference.
[11] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[12] Thomas M. Cover,et al. Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .
[13] Mohamed F. Younis,et al. Overlapping Multihop Clustering for Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[14] David Tse,et al. Multiaccess Fading Channels-Part II: Delay-Limited Capacities , 1998, IEEE Trans. Inf. Theory.
[15] Juyul Lee,et al. Energy-efficient scheduling of delay constrained traffic over fading channels , 2008, 2008 IEEE International Symposium on Information Theory.
[16] Sriram Vishwanath,et al. State amplification under masking constraints , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[17] Daniel Gatica-Perez,et al. International Conference on Mobile and Ubiquitous Multimedia , 2015 .
[18] Reem Elkhouly,et al. POSTER IPS: A Ubiquitous Indoor Positioning System , 2011, MobiQuitous.
[19] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[20] Moustafa Youssef,et al. A Probabilistic Clustering-Based Indoor Location Determination System , 2002 .
[21] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[22] Moustafa Youssef,et al. Energy-Aware TDMA-Based MAC for Sensor Networks , 2002 .
[23] Marco Gruteser. Indoor localization: ready for primetime? , 2013, MobiCom.
[24] Michail Matthaiou,et al. International Wireless Communications and Mobile Computing Conference , 2008 .
[25] Moustafa Youssef,et al. Analyzing the Point Coordination Function of the IEEE 802.11 WLAN Protocol using a Systems of Commun , 2002 .
[26] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[27] Moustafa Youssef,et al. Handling samples correlation in the Horus system , 2004, IEEE INFOCOM 2004.
[28] Moustafa Youssef,et al. On the delay limited secrecy capacity of fading channels , 2009, 2009 IEEE International Symposium on Information Theory.
[29] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[30] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[31] Moustafa Youssef,et al. Automatic Generation of Radio Maps for Localization Systems , 2010, MobiQuitous.
[32] Suhas N. Diggavi,et al. Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.
[33] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[34] Suhas N. Diggavi,et al. Secret-key generation with correlated sources and noisy channels , 2008, 2008 IEEE International Symposium on Information Theory.