Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation
暂无分享,去创建一个
[1] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[2] Brian M. Sadler,et al. Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.
[3] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[4] Cong Ling,et al. Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security , 2015, IEEE Transactions on Information Forensics and Security.
[5] Geoffrey Smith,et al. Min-entropy as a resource , 2013, Inf. Comput..
[6] Christian Cachin,et al. Entropy measures and unconditional security in cryptography , 1997 .
[7] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[8] A. Rényi. On Measures of Entropy and Information , 1961 .
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Serge Fehr,et al. On the Conditional Rényi Entropy , 2014, IEEE Transactions on Information Theory.
[11] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[12] John S. Baras,et al. Fingerprinting by Design: Embedding and Authentication , 2016, Digital Fingerprinting.
[13] Peter Elias,et al. List decoding for noisy channels , 1957 .
[14] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[15] O. Collins,et al. A comparison of known codes, random codes, and the best codes , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[16] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[17] Rick S. Blum,et al. Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).