Asymmetric Physical Layer Encryption for Wireless Communications
暂无分享,去创建一个
Wei Li | Kai-Kit Wong | Shilian Wang | Jing Lei | Syed Ali Raza Zaidi | Des Mclernon | D. McLernon | Jing Lei | Wei Li | Shilian Wang | Kai‐Kit Wong
[1] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[2] Li Zhou,et al. Increasing secret key capacity of OFDM systems: a geometric program approach , 2017, Concurr. Comput. Pract. Exp..
[3] Victor C. M. Leung,et al. Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.
[4] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[5] Alfred Menezes,et al. Elliptic Curves and Cryptography , 1999 .
[6] Junqing Zhang,et al. Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.
[7] François Le Gall,et al. Powers of tensors and fast matrix multiplication , 2014, ISSAC.
[8] Gaojie Chen,et al. Secure Transmission With Randomized Constellation Rotation for Downlink Sparse Code Multiple Access System , 2018, IEEE Access.
[9] Xu Liu,et al. Moving window scheme for extracting secret keys in stationary environments , 2016, IET Commun..
[10] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[12] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[13] Jing Lei,et al. Physical-layer encryption in massive MIMO systems with spatial modulation , 2018, China Communications.
[14] Hai Lin,et al. Intrinsic Interference Based Physical Layer Encryption for OFDM/OQAM , 2017, IEEE Communications Letters.
[15] Mounir Ghogho,et al. Physical layer security by robust masked beamforming and protected zone optimisation , 2014, IET Commun..
[16] Ajay Kumar Nain,et al. A Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design , 2017, IEEE Transactions on Computers.
[17] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[18] Mounir Ghogho,et al. Mathematical Model and Framework of Physical Layer Encryption for Wireless Communications , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[19] Nicolas Boullis,et al. Some optimizations of hardware multiplication by constant matrices , 2003, Proceedings 2003 16th IEEE Symposium on Computer Arithmetic.
[20] Mounir Ghogho,et al. Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region , 2014, IET Commun..
[21] Mounir Ghogho,et al. Physical layer security of MIMO frequency selective channels by beamforming and noise generation , 2011, 2011 19th European Signal Processing Conference.
[22] Chin-Chen Chang,et al. An ElGamal-Like Cryptosystem for Enciphering Large Messages , 2002, IEEE Trans. Knowl. Data Eng..
[23] Ying Huang,et al. Concatenated physical layer encryption scheme based on rateless codes , 2018, IET Commun..
[24] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[25] Li Sun,et al. Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping , 2018, IEEE Transactions on Wireless Communications.
[26] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[27] Edward David Moreno,et al. Asymmetric Encryption in Wireless Sensor Networks , 2012 .
[28] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.