메뉴 건너뛰기




Volumn , Issue , 2010, Pages 2518-2522

Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL COEFFICIENT; INPUT SIGNAL; JOINT MODELS; LOW SNR; MULTI-PATH; MULTIPATH CHANNELS; NON-ZERO CHANNELS; NONUNIFORM; SECRET KEY; SUBCHANNELS; TRAINING SIGNAL; TWO CHANNEL; TWO SOURCES; WIRELESS CHANNEL;

EID: 77955675787     PISSN: 21578103     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2010.5513556     Document Type: Conference Paper
Times cited : (37)

References (16)
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages broadcast channels with confidential messages
    • I. Csiszár and J. Körner. Broadcast channels with confidential messages broadcast channels with confidential messages. Information Theory, IEEE Transactions on, 24(3):339-348, 1978.
    • (1978) Information Theory, IEEE Transactions On , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 3
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • IEEE Transactions on
    • U. M. Maurer. Secret key agreement by public discussion from common information. Information Theory, IEEE Transactions on, 39(3):733-742, 1993.
    • (1993) Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 4
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography PART I: Secret sharing
    • IEEE Transactions on
    • R. Ahlswede and I. Csiszár. Common randomness in information theory and cryptography part I: Secret sharing. Information Theory, IEEE Transactions on, 39(4):1121-1132, 1993.
    • (1993) Information Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 5
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • IEEE Transactions on Jul
    • D. Slepian and J. Wolf. Noiseless coding of correlated information sources. Information Theory, IEEE Transactions on, 19(4):471-480, Jul 1973.
    • (1973) Information Theory , vol.19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.2
  • 6
    • 8444240827 scopus 로고    scopus 로고
    • Measurement and modeling of an ultra-wide bandwidth indoor channel
    • IEEE Transactions on Oct.
    • S.S. Ghassemzadeh, R. Jana, C.W. Rice, W. Turin, and V. Tarokh. Measurement and modeling of an ultra-wide bandwidth indoor channel. Communications, IEEE Transactions on, 52(10):1786-1796, Oct. 2004.
    • (2004) Communications , vol.52 , Issue.10 , pp. 1786-1796
    • Ghassemzadeh, S.S.1    Jana, R.2    Rice, C.W.3    Turin, W.4    Tarokh, V.5
  • 7
    • 77955705763 scopus 로고    scopus 로고
    • Sparse multipath wireless channels: Modeling and implications
    • A. Sayeed. Sparse multipath wireless channels: Modeling and implications. In Proc. ASAP, 2006.
    • (2006) Proc. ASAP
    • Sayeed, A.1
  • 10
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • IEEE International Conference on
    • A. Sayeed and A. Perrig. Secure wireless communications: Secret keys through multipath. In ICASSP 2008. IEEE International Conference on, pages 3013-3016, 2008.
    • (2008) ICASSP 2008 , pp. 3013-3016
    • Sayeed, A.1    Perrig, A.2
  • 11
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • IEEE Transactions on
    • R. Wilson, D. Tse, and R. A. Scholtz. Channel identification: Secret sharing using reciprocity in ultrawideband channels. Information Forensics and Security, IEEE Transactions on, 2(3):364-375, 2007.
    • (2007) Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 12
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly Gaussian random variables
    • 2006 IEEE International Symposium on July
    • Chunxuan Ye, A. Reznik, and Y. Shah. Extracting secrecy from jointly gaussian random variables. In Information Theory, 2006 IEEE International Symposium on, pages 2593-2597, July 2006.
    • (2006) Information Theory , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 15
    • 70449469434 scopus 로고    scopus 로고
    • Minimum energy per bit for secret key acquisition over multipath wireless channels
    • IEEE International Symposium on
    • T.-H. Chou, A. Sayeed, and S. Draper. Minimum energy per bit for secret key acquisition over multipath wireless channels. In Information Theory, 2009. ISIT 2009. IEEE International Symposium on, 2009.
    • (2009) Information Theory, 2009. ISIT 2009
    • Chou, T.-H.1    Sayeed, A.2    Draper, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.