A remark on secret-key generation over correlated fading channels
暂无分享,去创建一个
[1] Sang-Bin Rhee,et al. Results of Suburban Base Station Spatial Diversity Measurements in the UHF Band , 1974, IEEE Trans. Commun..
[2] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[3] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[4] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[5] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[6] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[7] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[8] G. Caire,et al. On the capacity of some channels with channel state information , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[9] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[10] Mohamed-Slim Alouini,et al. Noncoherent Capacity of Secret-Key Agreement With Public Discussion , 2011, IEEE Transactions on Information Forensics and Security.
[11] W.C.-Y. Lee. Effects on Correlation Between Two Mobile Radio Base-Station Antennas , 1973, IEEE Trans. Commun..
[12] Ashish Khisti. Secret key agreement on wiretap channel with transmitter side information , 2010, 2010 European Wireless Conference (EW).
[13] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[14] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[15] Matthieu Bloch,et al. Secret Sharing over Fast-Fading MIMO Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[16] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[17] Gregory W. Wornell,et al. Secure Broadcasting , 2007, ArXiv.
[18] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.