-
1
-
-
84889331012
-
-
M.Ghavami,M.L.B., andK.R., Ultra Wideband Signals and Systems in Communication Engineering, 2nd ed. John Wiley & Sons, 2007.
-
M.Ghavami,M.L.B., andK.R., Ultra Wideband Signals and Systems in Communication Engineering, 2nd ed. John Wiley & Sons, 2007.
-
-
-
-
2
-
-
0027629488
-
Common randomness in information theory and cryptography - part I: Secret sharing
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography - part I: Secret sharing," IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
A. Hassan, W. Stark, J. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Processing, Academic Press, vol. 6, pp. 207-212, 1996.
-
(1996)
Digital Signal Processing, Academic Press
, vol.6
, pp. 207-212
-
-
Hassan, A.1
Stark, W.2
Hershey, J.3
Chennakeshu, S.4
-
4
-
-
84899997445
-
Spatial correlation of uwb signals in a home environment
-
C. Prettie, D. Cheung, L. Rusch, and M. Ho, "Spatial correlation of uwb signals in a home environment," Ultra Wideband Systems and Technologies, 2002. Digest of Papers. 2002 IEEE Conference on, pp. 65-69, 2002.
-
(2002)
Ultra Wideband Systems and Technologies, 2002. Digest of Papers. 2002 IEEE Conference on
, pp. 65-69
-
-
Prettie, C.1
Cheung, D.2
Rusch, L.3
Ho, M.4
-
6
-
-
0029405656
-
Generalized privacy amplification
-
Bennett, Brassard, Crepeau, and Maurer, "Generalized privacy amplification," IEEE Transactions on Information Theory, vol. 41, no. 6, pp. 1915-1923,1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, B.1
Crepeau2
Maurer3
-
7
-
-
67449087271
-
Key Generation Technique Based on Wireless Channels Charactristics,
-
Master's thesis, Iran University of Science and Technology, Tehran,Iran, July
-
M. Ghoreishi Madiseh, "Key Generation Technique Based on Wireless Channels Charactristics," Master's thesis, Iran University of Science and Technology, Tehran,Iran, July 2007.
-
(2007)
-
-
Ghoreishi Madiseh, M.1
-
8
-
-
49649086664
-
Secret key extraction in ultra wideband channels for unsynchronized radios
-
May
-
M. Ghoreishi Madiseh, M. McGuire, S. Neville, and A. Beheshti Shirazi, "Secret key extraction in ultra wideband channels for unsynchronized radios," in Proc. CNSR08 IEEE Computer Society Press, May 2008, pp. 175-182.
-
(2008)
Proc. CNSR08 IEEE Computer Society Press
, pp. 175-182
-
-
Ghoreishi Madiseh, M.1
McGuire, M.2
Neville, S.3
Beheshti Shirazi, A.4
-
9
-
-
2942715331
-
A direct derivation of a single-antenna reciprocity relation for the time domain
-
June
-
G. Smith, "A direct derivation of a single-antenna reciprocity relation for the time domain," Antennas and Propagation, IEEE Transactions on, vol. 52, no. 6, pp. 1568-1577, June 2004.
-
(2004)
Antennas and Propagation, IEEE Transactions on
, vol.52
, Issue.6
, pp. 1568-1577
-
-
Smith, G.1
-
11
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
13
-
-
67449106208
-
-
R. Gallager, Low-Density Parity-Check Codes. MIT press, 1963. [14] N. Vereshchagin, A new proof Ahlswede - Gacs - Korner theorem on common information, Moscow State University, September 2002.
-
R. Gallager, Low-Density Parity-Check Codes. MIT press, 1963. [14] N. Vereshchagin, "A new proof Ahlswede - Gacs - Korner theorem on common information," Moscow State University, September 2002.
-
-
-
-
15
-
-
0037356065
-
Distributed source coding using syndromes (discus): Design and construction
-
Mar
-
S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (discus): design and construction," Information Theory, IEEE Transactions on, vol. 49, no. 3, pp. 626-643, Mar 2003.
-
(2003)
Information Theory, IEEE Transactions on
, vol.49
, Issue.3
, pp. 626-643
-
-
Pradhan, S.1
Ramchandran, K.2
-
16
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuel- lar, P. Drielsma, P. Hem, O. Kouchnarenko, J. Mantovani, S. Mdersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigan, and V. L., "The AVISPA tool for the automated validation of internet security protocols and applications," Proc. Computer Aided Verification, Lecture Notes in Computer Science, vol. 3576, pp. 281-285, 2005, http://www.avispa-project. org/.
-
(2005)
Proc. Computer Aided Verification, Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.7
Hem, P.8
Kouchnarenko, O.9
Mantovani, J.10
Mdersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigan, L.16
|