메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1391-1396

Key agreement over wireless fading channels with an active attacker

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK STRATEGIES; CHANNEL MODEL; KEY AGREEMENT; KEY AGREEMENT PROTOCOL; SOURCE MODELS; WIRELESS FADING CHANNELS; WIRELINE COMMUNICATION;

EID: 79952401767     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ALLERTON.2010.5707076     Document Type: Conference Paper
Times cited : (5)

References (16)
  • 1
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inform. Theory, vol. 54, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 2
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inform. Theory, vol. 54, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 3
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sept.
    • R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inform. Forensics and Security, vol. 2, pp. 364-375, Sept. 2007.
    • (2007) IEEE Trans. Inform. Forensics and Security , vol.2 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 4
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 6
    • 0037396695 scopus 로고    scopus 로고
    • Secret key agreement over a non-authenticated channel - Part I: Definitions and bounds
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel - Part I: Definitions and bounds," IEEE Trans. Inform. Theory, vol. 49, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 7
    • 0037399113 scopus 로고    scopus 로고
    • Secret key agreement over a non-authenticated channel - Part II: The simulatability condition
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 8
    • 0037396951 scopus 로고    scopus 로고
    • Secret key agreement over a non-authenticated channel - Part III: Privacy amplification
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel - Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 9
    • 0023310427 scopus 로고
    • Gaussian arbitrarily varying channels
    • Mar.
    • B. Hughes and P. Narayan, "Gaussian arbitrarily varying channels," IEEE Trans. Inform. Theory, vol. 33, pp. 267-284, Mar. 1987.
    • (1987) IEEE Trans. Inform. Theory , vol.33 , pp. 267-284
    • Hughes, B.1    Narayan, P.2
  • 10
    • 0026055468 scopus 로고
    • Capacity of the Gaussian arbitrarily varying channel
    • Jan.
    • I. Csiszar and P. Narayan, "Capacity of the Gaussian arbitrarily varying channel," IEEE Trans. Inform. Theory, vol. 37, pp. 18-26, Jan. 1991.
    • (1991) IEEE Trans. Inform. Theory , vol.37 , pp. 18-26
    • Csiszar, I.1    Narayan, P.2
  • 11
    • 0020497622 scopus 로고
    • The Gaussian test channel with an intelligent jammer
    • Jan.
    • T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Inform. Theory, vol. 29, pp. 152-157, Jan. 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , pp. 152-157
    • Basar, T.1
  • 13
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar.
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 14
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO Gaussian fading channels
    • Sept.
    • A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inform. Theory, vol. 50, pp. 2119-2123, Sept. 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , pp. 2119-2123
    • Kashyap, A.1    Basar, T.2    Srikant, R.3
  • 15
    • 0034188649 scopus 로고    scopus 로고
    • The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel
    • May
    • M. Médard, "The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel," IEEE Trans. Inform. Theory, vol. 46, pp. 933-946, May 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 933-946
    • Médard, M.1
  • 16
    • 0037399093 scopus 로고    scopus 로고
    • How much training is needed in multiple-antenna wireless links?
    • Apr.
    • B. Hassibi and B. M. Hochwald, "How much training is needed in multiple-antenna wireless links?," IEEE Trans. Inform. Theory, vol. 49, pp. 951-963, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 951-963
    • Hassibi, B.1    Hochwald, B.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.