-
1
-
-
0027629488
-
Common randomness in information theory and cryptography - part I: Secret sharing
-
R. Ahlswede and I. Csiszar. Common randomness in information theory and cryptography - part I: Secret sharing. IEEE Transactions on Information Theory, 39(4):1121-1132, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
2
-
-
0031701886
-
Common randomness in information theory and cryptography-part ii: Cr capacity
-
R. Ahlswede and I. Csiszar. Common randomness in information theory and cryptography-part ii: Cr capacity. IEEE Transactions on Information Theory, pages 225-240, 1998.
-
(1998)
IEEE Transactions on Information Theory
, pp. 225-240
-
-
Ahlswede, R.1
Csiszar, I.2
-
4
-
-
49649120026
-
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin. Wireless information-theoretic security, part i, theoretical aspects
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin. Wireless information-theoretic security - part i - theoretical aspects.
-
-
-
-
5
-
-
49649105916
-
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin. Wireless information-theoretic security, part ii: Practical implementation
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin. Wireless information-theoretic security - part ii: Practical implementation.
-
-
-
-
8
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
I. Csiszar and P. Narayan. Common randomness and secret key generation with a helper. IEEE Trans. on Information Theory, pages 344-366, 2001.
-
(2001)
IEEE Trans. on Information Theory
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
10
-
-
49649092949
-
-
J. Foerster and Q. Li. Uwb channel modeling contribution from intel
-
J. Foerster and Q. Li. Uwb channel modeling contribution from intel.
-
-
-
-
12
-
-
78149248764
-
Protocols for secret key agreement by public discussion based on common information. Advances in Cryptology - CRYPTO'92
-
Aug
-
U. M. Maurer. Protocols for secret key agreement by public discussion based on common information. Advances in Cryptology - CRYPTO'92, Lecture Notes in Computer Science, 740:461-470, Aug 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 461-470
-
-
Maurer, U.M.1
-
13
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, 39(3):733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
14
-
-
49649101402
-
-
J. Muramatsu. Secret key agreement from correlated source outputs using ldpc matrices. In in Proc. ISIT2004, Chicago, USA, July 2004.
-
J. Muramatsu. Secret key agreement from correlated source outputs using ldpc matrices. In in Proc. ISIT2004, Chicago, USA, July 2004.
-
-
-
-
16
-
-
49649117332
-
-
M. Pendergrass. Empirically based statistical ultrawideband channel model
-
M. Pendergrass. Empirically based statistical ultrawideband channel model.
-
-
-
-
19
-
-
0023288305
-
A statistical model for indoor multipath propagation
-
A. Saleh and R. Valenzuela. A statistical model for indoor multipath propagation. IEEE JSAC, SAC-5(2):128-137, 1987.
-
(1987)
IEEE JSAC
, vol.SAC-5
, Issue.2
, pp. 128-137
-
-
Saleh, A.1
Valenzuela, R.2
-
20
-
-
49649119101
-
Secret key capacity for wireless nakagami and suzuki fading channels
-
March
-
A. Shahzadi, M. Ghoreishi, and A. Beheshti. Secret key capacity for wireless nakagami and suzuki fading channels. International Journal of Computer Science and Network Security (IJCSNS), 7(3):296-303, March 2007.
-
(2007)
International Journal of Computer Science and Network Security (IJCSNS)
, vol.7
, Issue.3
, pp. 296-303
-
-
Shahzadi, A.1
Ghoreishi, M.2
Beheshti, A.3
-
22
-
-
0035727429
-
-
M. A. Tope and J. C. McEachen. Unconditionally secure communications over fading channels. In in Proc. MILCOM. IEEE, 2001.
-
M. A. Tope and J. C. McEachen. Unconditionally secure communications over fading channels. In in Proc. MILCOM. IEEE, 2001.
-
-
-
-
23
-
-
39049156464
-
-
proceedings ISIT, Seattle, WA, USA, July
-
C. Ye, A. Reznik, and Y. Shah. Extracting secrecy from jointly gaussian random variables. In in proceedings ISIT 2006, pages 2593-2597, Seattle, WA., USA, July 2006.
-
(2006)
Extracting secrecy from jointly gaussian random variables
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
|