Secret key agreement based on a communication through wireless MIMO fading channels
暂无分享,去创建一个
Guillermo Morales-Luna | Valery I. Korzhik | Viktor Yakovlev | Pavel Mylnikov | G. Morales-Luna | V. Yakovlev | V. Korzhik | Pavel Mylnikov
[1] Daniele Micciancio. Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.
[2] A. Land,et al. An Automatic Method for Solving Discrete Programming Problems , 1960, 50 Years of Integer Programming.
[3] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[4] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[5] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[6] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[7] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[8] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[9] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[10] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[11] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[12] Bo Ai,et al. Assessment of LTE-R Using High Speed Railway Channel Model , 2011, 2011 Third International Conference on Communications and Mobile Computing.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[14] Martin E. Hellman,et al. A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.
[15] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[16] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[17] Adnan Kavak,et al. Analytical Derivation of 2×2 MIMO Channel Capacity in Terms of Multipath Angle Spread and Signal Strength , 2012 .
[18] Guillermo Morales-Luna,et al. Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna , 2011, ArXiv.
[19] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[20] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[21] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[22] Krishnamoorthy Iyer. Broadcast channel with confidential messages and secret keys , 2016, 2016 Twenty Second National Conference on Communication (NCC).
[23] Guillermo Morales-Luna,et al. Wire-tap channel concept in nature and society , 2014, IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications.
[24] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[25] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[26] Jochen Schiller,et al. Mobile Communications , 1996, IFIP — The International Federation for Information Processing.
[27] Stark C. Draper,et al. Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.