An Electromagnetic Analysis of Noise-Based Intrinsically Secure Communication in Wireless Systems
暂无分享,去创建一个
Marco Donald Migliore | Daniele Pinchera | Fulvio Schettino | Mario Lucido | Gaetano Panariello | M. Migliore | G. Panariello | F. Schettino | M. Lucido | Daniele Pinchera
[1] M.A. Jensen,et al. A review of antennas and propagation for MIMO wireless communications , 2004, IEEE Transactions on Antennas and Propagation.
[2] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[3] Krishnamoorthy Iyer. Broadcast channel with confidential messages and secret keys , 2016, 2016 Twenty Second National Conference on Communication (NCC).
[4] J. Wallace,et al. Capacity of the Continuous-Space Electromagnetic Channel , 2008, IEEE Transactions on Antennas and Propagation.
[5] D. Jason Palmer. Noise keeps the spooks off your back , 2007 .
[6] M. Migliore,et al. On Electromagnetics and Information Theory , 2008, IEEE Transactions on Antennas and Propagation.
[7] M. Migliore. On the role of the number of degrees of freedom of the field in MIMO channels , 2006, IEEE Transactions on Antennas and Propagation.
[8] M. Migliore. On the Sampling of the Electromagnetic Field Radiated by Sparse Sources , 2015, IEEE Transactions on Antennas and Propagation.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[11] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[12] Nader Mokari,et al. Secure communications in OFDMA decode and forward relay assisted networks in presence of multiple eavesdroppers , 2016, 2016 8th International Symposium on Telecommunications (IST).
[13] Chiman Kwan,et al. Unconditionally secure credit/debit card chip scheme and physical unclonable function , 2016, ArXiv.
[14] Tharmalingam Ratnarajah,et al. Secrecy Outage Analysis of $k$ th Best Link in Random Wireless Networks , 2017, IEEE Transactions on Communications.
[15] Adrian Cho,et al. Simple Noise May Stymie Spies Without Quantum Weirdness , 2005, Science.
[16] F. K. Gruber,et al. New Aspects of Electromagnetic Information Theory for Wireless and Antenna Systems , 2008, IEEE Transactions on Antennas and Propagation.
[17] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[18] Marco Donald Migliore,et al. Effectively Exploiting Parasitic Arrays for Secret Key Sharing , 2016, IEEE Transactions on Vehicular Technology.
[19] G. Franceschetti,et al. On the degrees of freedom of scattered fields , 1989 .
[20] H. Vincent Poor,et al. The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.