메뉴 건너뛰기




Volumn , Issue , 2009, Pages 6-10

ARQ secrecy: From theory to practice

Author keywords

[No Author keywords available]

Indexed keywords

802.11 NETWORKS; ACHIEVABILITY; AUTOMATIC REPEAT REQUEST; MADWIFI; OUTAGE PROBABILITY; REALISTIC SCENARIO; SECURITY THREATS;

EID: 76249101125     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITW.2009.5351483     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, volume 54, no.8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. on Information Theory, vol.24, pp. 339-348, May 1978.
    • (1978) IEEE Trans. on Information Theory , vol.24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 5
    • 44049101918 scopus 로고    scopus 로고
    • On the achievable secrecy throughput of block fading channels with no channel state information at transmitter
    • March
    • X. Tang, R. Liu, P. Spasojevic, "On the achievable secrecy throughput of block fading channels with no channel state information at transmitter," 41st Annual Conference on Information Sciences and Systems CISS '07, pp. 917-922, March 2007.
    • (2007) 41st Annual Conference on Information Sciences and Systems CISS '07 , pp. 917-922
    • Tang, X.1    Liu, R.2    Spasojevic, P.3
  • 6
    • 70449501021 scopus 로고    scopus 로고
    • On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
    • June
    • X. Tang, R. Liu, P. Spasojević, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," Proc. of ISIT 2007, pp. 1355-1387, June 2007.
    • (2007) Proc. of ISIT 2007 , pp. 1355-1387
    • Tang, X.1    Liu, R.2    Spasojević, P.3    Poor, H.V.4
  • 8
    • 39049151282 scopus 로고    scopus 로고
    • LDPC-based secret key agreement over the Gaussian wiretap channel
    • July
    • M. Bloch, A. Thangaraj, S. W. McLaughlin, and J. Merolla, "LDPC-based secret key agreement over the Gaussian wiretap channel," Proc. of ISIT 2006, pp. 1179-1183, July 2006.
    • (2006) Proc. of ISIT 2006 , pp. 1179-1183
    • Bloch, M.1    Thangaraj, A.2    McLaughlin, S.W.3    Merolla, J.4
  • 12
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Serge Vaudenay and Amr M. Youssef, editors' Selected Areas in Cryptography 2001, Springer
    • S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," Serge Vaudenay and Amr M. Youssef, editors' Selected Areas in Cryptography 2001, volume 2259 of Lecture Notes in Computer Science, pp. 1-24, Springer 2001.
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 13
    • 76249104851 scopus 로고    scopus 로고
    • KoreK. chopchop (Experimental WEP attacks)
    • KoreK. chopchop (Experimental WEP attacks). http://www.netstumbler.org/ showthread.php?t=12489, 2004.
    • (2004)
  • 14
    • 33751050307 scopus 로고    scopus 로고
    • KoreK
    • KoreK. Next generation of WEP attacks? http://www.netstumbler.org/f18/ next-generation-wep-attacks-12277/, 2004.
    • (2004) Next Generation of WEP Attacks?


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.