Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary
暂无分享,去创建一个
[1] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[2] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[3] Shun Watanabe,et al. Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[4] Kannan Ramchandran,et al. Distributed source coding using syndromes (DISCUS): design and construction , 2003, IEEE Trans. Inf. Theory.
[5] Tao Jin,et al. Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.
[6] Olivier Chevassut,et al. Key Derivation and Randomness Extraction , 2005, IACR Cryptol. ePrint Arch..
[7] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Mudhakar Srivatsa,et al. A note on information-theoretic secret key exchange over wireless channels , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[11] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[12] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[13] Jon W. Wallace. Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.
[14] V. Jungnickel,et al. A MIMO system with reciprocal transceivers for the time-division duplex mode , 2004, IEEE Antennas and Propagation Society Symposium, 2004..
[15] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[16] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[17] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[18] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[19] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[20] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[21] Hisato Iwai,et al. A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property , 2008, 2008 IEEE International Symposium on Information Theory.
[22] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[23] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[24] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[25] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[26] Shun Watanabe,et al. Secret key agreement from vector Gaussian sources by rate limited public communication , 2010, 2010 IEEE International Symposium on Information Theory.
[27] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[28] D. Towsley,et al. Physical-Layer-Enhanced Wireless Secret Key Exchange , 2010 .
[29] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[30] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[31] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.