A Coding Approach With Key-Channel Randomization for Physical-Layer Authentication
暂无分享,去创建一个
[1] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[2] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[3] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[4] Chung G. Kang,et al. MIMO-OFDM Wireless Communications with MATLAB , 2010 .
[5] Jinho Choi,et al. Secure Transmissions via Compressive Sensing in Multicarrier Systems , 2016, IEEE Signal Processing Letters.
[6] Xianbin Wang,et al. Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.
[7] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[8] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[9] Hyuckjae Lee,et al. Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.
[10] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[11] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[12] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[13] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[14] Jinho Choi. Channel estimation for coherent multi-carrier CDMA systems over fast fading channels , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).
[15] Willie K. Harrison,et al. Quantifying equivocation for finite blocklength wiretap codes , 2017, 2017 IEEE International Conference on Communications (ICC).
[16] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[17] Rudolf Ahlswede,et al. Hiding Data - Selected Topics , 2016 .
[18] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[19] Zhen Yang,et al. Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.
[20] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[21] Jinho Choi. Adaptive and Iterative Signal Processing in Communications , 2006 .
[22] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[23] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[24] Jinho Choi,et al. Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming , 2017, IEEE Transactions on Information Forensics and Security.
[25] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[26] Sinem Coleri Ergen,et al. Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..
[27] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[28] Shu Lin,et al. Soft-decision decoding of linear block codes based on ordered statistics , 1994, IEEE Trans. Inf. Theory.
[29] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.