On Quantization for Secret Key Generation From Wireless Channel Samples
暂无分享,去创建一个
[1] Xiaoming Xu,et al. A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel , 2019, IEEE Access.
[2] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[3] Martin Kraus,et al. Evaluation of Physical Layer Secret Key Generation for IoT Devices , 2019, 2019 IEEE 20th Wireless and Microwave Technology Conference (WAMICON).
[4] Furqan Jameel,et al. Secure Communications in Three-Step Two-Way Energy Harvesting DF Relaying , 2018, IEEE Communications Letters.
[5] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[6] Abhay Kumar,et al. Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging , 2019, Phys. Commun..
[7] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[8] Xianbin Wang,et al. Integrating PHY Security Into NDN-IoT Networks By Exploiting MEC: Authentication Efficiency, Robustness, and Accuracy Enhancement , 2019, IEEE Transactions on Signal and Information Processing over Networks.
[9] Wirawan,et al. An Efficient Key Generation for the Internet of Things Based Synchronized Quantization , 2019, Sensors.
[10] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[11] Furqan Jameel,et al. On the Secrecy Performance of SWIPT Receiver Architectures with Multiple Eavesdroppers , 2018, Wirel. Commun. Mob. Comput..
[12] Mathini Sellathurai,et al. Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[13] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[14] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[15] Jianfeng Ma,et al. Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks , 2017, IEEE Access.
[16] Tony Q. S. Quek,et al. Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Transactions on Wireless Communications.
[17] Xinyi Huang,et al. An Adaptive Secret Key Establishment Scheme in Smart Home Environments , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[18] Honggang Wang,et al. Integrated Node Authentication and Key Distribution Method for Body Area Network , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[19] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[20] Biao Han,et al. LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications , 2020, Sensors.
[21] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[22] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[23] Shurjeel Wyne,et al. Spatial Modeling of Interference in Inter-Vehicular Communications for 3-D Volumetric Wireless Networks , 2020, IEEE Access.
[24] Moustafa Youssef,et al. Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.
[25] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[26] Fernando Perez Fontan,et al. Modelling the Wireless Propagation Channel: A simulation approach with MATLAB , 2008 .
[27] Furqan Jameel,et al. Secrecy Outage for Wireless Sensor Networks , 2017, IEEE Communications Letters.
[28] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.
[29] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[30] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[31] Shree Krishna Sharma,et al. Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future , 2019, IEEE Access.
[32] Dieter Hogrefe,et al. Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[33] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[34] Andrei Gurtov,et al. Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.
[35] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[36] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.
[37] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[38] Xian Liu. Outage Probability of Secrecy Capacity over Correlated Log-Normal Fading Channels , 2013, IEEE Communications Letters.
[39] Michael McGuire,et al. Channel Estimation for Secret Key Generation , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[40] Roger Woods,et al. Physical Layer Security for the Internet of Things: Authentication and Key Generation , 2019, IEEE Wireless Communications.
[41] Edgar Talavera,et al. A Review of Security Aspects in Vehicular Ad-Hoc Networks , 2019, IEEE Access.
[42] Cagatay Candan,et al. The moment function for the ratio of correlated generalized gamma variables , 2013 .
[43] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[44] Aiqun Hu,et al. Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems , 2019, IEEE Communications Letters.
[45] Vijay Devabhaktuni,et al. An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise , 2018, IEEE Access.