-
1
-
-
31344448046
-
-
M. Shin, J. Ma, A. Mishra, and W. Arbaugh, Wireless network security and interworking, Proceedings of the IEEE, 94, no. 2, pp. 455-466, Feburary 2006.
-
M. Shin, J. Ma, A. Mishra, and W. Arbaugh, "Wireless network security and interworking," Proceedings of the IEEE, vol. 94, no. 2, pp. 455-466, Feburary 2006.
-
-
-
-
3
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. Hellman, "New directions in cryptography," Information Theory, IEEE Transactions on, vol. 22, no. 6, pp. 644-654, Nov 1976.
-
(1976)
Information Theory, IEEE Transactions on
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
4
-
-
84890522850
-
-
C. Shannon, Communication theory of secrecy systems. Bell Systems Techn, Journal, 28, pp. 656-715, 1949.
-
C. Shannon, "Communication theory of secrecy systems. Bell Systems Techn," Journal, vol. 28, pp. 656-715, 1949.
-
-
-
-
5
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. Maurer, "Secret key agreement by public discussion from common information," Information Theory, IEEE Transactions on, vol. 39, no. 3, pp. 733-742, 1993.
-
(1993)
Information Theory, IEEE Transactions on
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
7
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result," Information Theory, IEEE Transactions on, vol. 49, no. 4, pp. 822-831, 2003.
-
(2003)
Information Theory, IEEE Transactions on
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
8
-
-
0027629488
-
-
I. Ahlswede, R.; Csiszar, Common randomness in information theory and cryptography. i. secret sharing, Information Theory, IEEE Transactions on, 39, no. 4, pp. 1121-1132, July 1993.
-
I. Ahlswede, R.; Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," Information Theory, IEEE Transactions on, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
-
-
-
9
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
January
-
J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," Communications, IEEE Transactions on, vol. 43, no. 1, pp. 3-6, January 1995.
-
(1995)
Communications, IEEE Transactions on
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
10
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Processing, vol. 6, pp. 207-212, 1996.
-
(1996)
Digital Signal Processing
, vol.6
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
11
-
-
0033881606
-
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, Secure information transmission for mobile radio, Communications Letters, IEEE, 4, no. 2, pp. 52-55, Feburary 2000.
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," Communications Letters, IEEE, vol. 4, no. 2, pp. 52-55, Feburary 2000.
-
-
-
-
13
-
-
0347337828
-
-
I. Hero, A.O., Secure space-time communication, Information Theory, IEEE Transactions on, 49, no. 12, pp. 3235-3249, Dec. 2003.
-
I. Hero, A.O., "Secure space-time communication," Information Theory, IEEE Transactions on, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
-
-
-
14
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Nov
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," Antennas and Propagation, IEEE Transactions on, vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
-
(2005)
Antennas and Propagation, IEEE Transactions on
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
15
-
-
34347221921
-
A Scheme of Secret Key Agreement Based on Received Signal Strength Variation by Antenna Switching in Land Mobile Radio
-
A. Kitaura, H. Iwai, and H. Sasaoka, "A Scheme of Secret Key Agreement Based on Received Signal Strength Variation by Antenna Switching in Land Mobile Radio," Advanced Communication Technology, The 9th International Conference on, vol. 3, pp. 1763-1767, 2007.
-
(2007)
Advanced Communication Technology, The 9th International Conference on
, vol.3
, pp. 1763-1767
-
-
Kitaura, A.1
Iwai, H.2
Sasaoka, H.3
-
16
-
-
23944474290
-
Electrically steerable passive array radiator (espar) antennas
-
April
-
H. Kawakami and T. Ohira, "Electrically steerable passive array radiator (espar) antennas," Antennas and Propagation Magazine, IEEE, vol. 47, no. 2, pp. 43-50, April 2005.
-
(2005)
Antennas and Propagation Magazine, IEEE
, vol.47
, Issue.2
, pp. 43-50
-
-
Kawakami, H.1
Ohira, T.2
-
18
-
-
0029405656
-
Generalized privacy amplification
-
November
-
C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, "Generalized privacy amplification," Information Theory, IEEE Transactions on, vol. 41, no. 6, pp. 1915-1923, November 1995.
-
(1995)
Information Theory, IEEE Transactions on
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
19
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification," Information Theory, IEEE Transactions on, vol. 49, no. 4, pp. 839-851, 2003.
-
(2003)
Information Theory, IEEE Transactions on
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
|