메뉴 건너뛰기




Volumn , Issue , 2008, Pages 732-736

A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property

Author keywords

[No Author keywords available]

Indexed keywords

DIRECTIONAL ANTENNAS; ESPAR ANTENNAS; INTERNATIONAL SYMPOSIUM; KEY AGREEMENT; KEY GENERATION; MULTI-LEVEL; PARITY CHECKING; RADIO CHANNELS; SECRET KEY AGREEMENT; SIMULATION RESULTS; WIRELESS COMMUNICATION;

EID: 52349107260     PISSN: 21578101     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2008.4595083     Document Type: Conference Paper
Times cited : (27)

References (19)
  • 1
    • 31344448046 scopus 로고    scopus 로고
    • M. Shin, J. Ma, A. Mishra, and W. Arbaugh, Wireless network security and interworking, Proceedings of the IEEE, 94, no. 2, pp. 455-466, Feburary 2006.
    • M. Shin, J. Ma, A. Mishra, and W. Arbaugh, "Wireless network security and interworking," Proceedings of the IEEE, vol. 94, no. 2, pp. 455-466, Feburary 2006.
  • 4
    • 84890522850 scopus 로고    scopus 로고
    • C. Shannon, Communication theory of secrecy systems. Bell Systems Techn, Journal, 28, pp. 656-715, 1949.
    • C. Shannon, "Communication theory of secrecy systems. Bell Systems Techn," Journal, vol. 28, pp. 656-715, 1949.
  • 5
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, "Secret key agreement by public discussion from common information," Information Theory, IEEE Transactions on, vol. 39, no. 3, pp. 733-742, 1993.
    • (1993) Information Theory, IEEE Transactions on , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 7
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result," Information Theory, IEEE Transactions on, vol. 49, no. 4, pp. 822-831, 2003.
    • (2003) Information Theory, IEEE Transactions on , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 8
    • 0027629488 scopus 로고    scopus 로고
    • I. Ahlswede, R.; Csiszar, Common randomness in information theory and cryptography. i. secret sharing, Information Theory, IEEE Transactions on, 39, no. 4, pp. 1121-1132, July 1993.
    • I. Ahlswede, R.; Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," Information Theory, IEEE Transactions on, vol. 39, no. 4, pp. 1121-1132, July 1993.
  • 9
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • January
    • J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," Communications, IEEE Transactions on, vol. 43, no. 1, pp. 3-6, January 1995.
    • (1995) Communications, IEEE Transactions on , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.1    Hassan, A.2    Yarlagadda, R.3
  • 11
    • 0033881606 scopus 로고    scopus 로고
    • H. Koorapaty, A. Hassan, and S. Chennakeshu, Secure information transmission for mobile radio, Communications Letters, IEEE, 4, no. 2, pp. 52-55, Feburary 2000.
    • H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," Communications Letters, IEEE, vol. 4, no. 2, pp. 52-55, Feburary 2000.
  • 13
    • 0347337828 scopus 로고    scopus 로고
    • I. Hero, A.O., Secure space-time communication, Information Theory, IEEE Transactions on, 49, no. 12, pp. 3235-3249, Dec. 2003.
    • I. Hero, A.O., "Secure space-time communication," Information Theory, IEEE Transactions on, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
  • 14
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Nov
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," Antennas and Propagation, IEEE Transactions on, vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
    • (2005) Antennas and Propagation, IEEE Transactions on , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 15
    • 34347221921 scopus 로고    scopus 로고
    • A Scheme of Secret Key Agreement Based on Received Signal Strength Variation by Antenna Switching in Land Mobile Radio
    • A. Kitaura, H. Iwai, and H. Sasaoka, "A Scheme of Secret Key Agreement Based on Received Signal Strength Variation by Antenna Switching in Land Mobile Radio," Advanced Communication Technology, The 9th International Conference on, vol. 3, pp. 1763-1767, 2007.
    • (2007) Advanced Communication Technology, The 9th International Conference on , vol.3 , pp. 1763-1767
    • Kitaura, A.1    Iwai, H.2    Sasaoka, H.3
  • 16
    • 23944474290 scopus 로고    scopus 로고
    • Electrically steerable passive array radiator (espar) antennas
    • April
    • H. Kawakami and T. Ohira, "Electrically steerable passive array radiator (espar) antennas," Antennas and Propagation Magazine, IEEE, vol. 47, no. 2, pp. 43-50, April 2005.
    • (2005) Antennas and Propagation Magazine, IEEE , vol.47 , Issue.2 , pp. 43-50
    • Kawakami, H.1    Ohira, T.2
  • 19
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification," Information Theory, IEEE Transactions on, vol. 49, no. 4, pp. 839-851, 2003.
    • (2003) Information Theory, IEEE Transactions on , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.