The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.
暂无分享,去创建一个
[1] Michel Fattouche,et al. A comparison of two radio propagation channel impulse response determination techniques , 1993 .
[2] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[3] Derek Young,et al. A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[4] Ralph Howard,et al. Data encryption standard , 1987 .
[5] C. N. Mathur,et al. Security Issues in Cognitive Radio Networks , 2007 .
[6] Vincent K. N. Lau,et al. The Mobile Radio Propagation Channel , 2007 .
[7] T. Ohira. Secret key generation exploiting antenna beam steering and wave propagation reciprocity , 2005, 2005 European Microwave Conference.
[8] Kazukuni Kobara,et al. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System , 2007, WISA.
[9] R. Vaughan. Switched parasitic elements for antenna diversity , 1999 .
[10] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[11] G.S. Smith,et al. A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.
[12] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[13] Hideichi Sasaoka,et al. A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio , 2005 .
[14] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] T. Ohira,et al. Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme , 2005, The European Conference on Wireless Technology, 2005..
[17] R. J. Potton,et al. Reciprocity in optics , 2004 .
[18] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[19] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[20] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[21] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[22] H. Sasaoka,et al. A Scheme of Secret Key Agreement Based on Received Signal Strength Variation by Antenna Switching in Land Mobile Radio , 2007, The 9th International Conference on Advanced Communication Technology.