메뉴 건너뛰기




Volumn 17, Issue 5, 2010, Pages 63-70

Exploiting the physical layer for enhanced security

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SERVICES; CRYPTOGRAPHIC SECURITY; DOMAIN-SPECIFIC INFORMATION; PHYSICAL LAYER PROPERTIES; PHYSICAL LAYERS; RADIO CHANNELS; SECURITY FRAMEWORKS; SECURITY MECHANISM; SECURITY THREATS; TEMPORAL DECORRELATION; WIRELESS MEDIUM;

EID: 77958106569     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2010.5601960     Document Type: Article
Times cited : (78)

References (10)
  • 3
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for Wireless authentication in time-variant channels
    • L. Xiao et al., "Using the Physical Layer for Wireless Authentication in Time-Variant Channels," IEEE Trans. Wireless Commun., vol.7, 2008, pp. 2571-2579
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , pp. 2571-2579
    • Xiao, L.1
  • 4
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Commun., vol.43, 1995, pp. 3-6.
    • (1995) IEEE Trans. Commun. , vol.43 , pp. 3-6
    • Hershey, J.1    Hassan, A.2    Yarlagadda, R.3
  • 5
    • 45249104850 scopus 로고    scopus 로고
    • Wireless information-theoretic security
    • June
    • M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Info. Theory, vol.54, no.6, June 2008, pp. 2515-2534
    • (2008) IEEE Trans. Info. Theory , vol.54 , Issue.6 , pp. 2515-2534
    • Bloch, M.1
  • 7
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Info. Theory, vol.39, 1993, pp. 733-742
    • (1993) IEEE Trans. Info. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 8
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, part 1: Secret sharing
    • R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography, Part 1: Secret Sharing," IEEE Trans. Info. Theory, vol.39, 1993, pp. 1121-1132
    • (1993) IEEE Trans. Info. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 9
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly gaussian random variables
    • C. Ye, A. Reznik, and Y. Shah, "Extracting Secrecy from Jointly Gaussian Random Variables," Proc. Int'l. Symp. Info. Theory, 2006, pp. 2593-2597
    • (2006) Proc. int'L. Symp. Info. Theory , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 10
    • 70450258484 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a cryptographic key from an unauthenticated wireless channel
    • S. Mathur et al., "Radio-Telepathy: Extracting a Cryptographic Key from an Unauthenticated Wireless Channel," 14th ACM MobiCom, 2008.
    • (2008) 14th ACM MobiCom
    • Mathur, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.