-
1
-
-
79551648542
-
Secret key agreement based on radio propagation characteristics in two-way relaying systems
-
Miami, FL, Dec
-
T. Shimizu, H. Iwai, H. Sasaoka, and A. Paulraj, "Secret key agreement based on radio propagation characteristics in two-way relaying systems", in Proc. 2010 IEEE Global Commun. Conf. (GLOBECOM'10), Miami, FL, Dec. 2010, pp. 1-6.
-
(2010)
Proc. 2010 IEEE Global Commun. Conf. (GLOBECOM'10)
, pp. 1-6
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
Paulraj, A.4
-
2
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems", Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
3
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
6
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing", IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
7
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan
-
J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management", IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
8
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio", Digital Signal Process., vol. 6, pp. 207-212, Oct. 1996. (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
9
-
-
18844455568
-
A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio
-
DOI 10.1002/ecjc.20167
-
A. Kitaura and H. Sasaoka, "A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio", Electron. Commun. Jpn. III, Fundamental Electron. Sci., vol. 88, no. 9, pp. 1-10, Apr. 2005. (Pubitemid 40680088)
-
(2005)
Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)
, vol.88
, Issue.9
, pp. 1-10
-
-
Kitaura, A.1
Sasaoka, H.2
-
10
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
DOI 10.1109/TAP.2005.858853
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels", IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
11
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in UWB channels", IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
12
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
13
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
San Francisco, CA, Sep
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel", in Proc. 14th ACM Int. Conf. Mobile Comput. and Netw. (MobiCom'08), San Francisco, CA, Sep. 2008, pp. 128-139.
-
(2008)
Proc. 14th ACM Int. Conf. Mobile Comput. and Netw. (MobiCom'08)
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
14
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Jun
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, "Information-theoretically secret key generation for fading wireless channels", IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
16
-
-
33947617858
-
Wireless network coding by amplify-and-forward for bi-directional traffic flows
-
DOI 10.1109/LCOMM.2007.061436
-
P. Popovski and H. Yomo, "Wireless network coding by amplify-andforward for bi-directional traffic flows", IEEE Commun. Lett., vol. 11, no. 1, pp. 16-18, Jan. 2007. (Pubitemid 46501839)
-
(2007)
IEEE Communications Letters
, vol.11
, Issue.1
, pp. 16-18
-
-
Popovski, P.1
Yomo, H.2
-
17
-
-
38549175070
-
Physical network coding in two-way wireless relay channels
-
DOI 10.1109/ICC.2007.121, 4288792, 2007 IEEE International Conference on Communications, ICC'07
-
P. Popovski and H. Yomo, "Physical network coding in two-way wireless relay channels", in Proc. 2007 IEEE Int. Conf. Commun. (ICC'07), Glasgow, Scotland, Jun. 2007, pp. 707-712. (Pubitemid 351145618)
-
(2007)
IEEE International Conference on Communications
, pp. 707-712
-
-
Popovski, P.1
Yomo, H.2
-
18
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, Sep
-
R. Negi and S. Goel, "Secret communication using artificial noise", in Proc. 62nd IEEE Veh. Technol. Conf. (VTC-Fall'05), Dallas, TX, Sep. 2005, vol. 3, pp. 1906-1910.
-
(2005)
Proc. 62nd IEEE Veh. Technol. Conf. (VTC-Fall'05)
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
19
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise", IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
20
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
New Orleans, LA, Dec
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming", in Proc. 2008 IEEE Global Commun. Conf. (GLOBECOM'08), New Orleans, LA, Dec. 2008, pp. 1-5.
-
(2008)
Proc. 2008 IEEE Global Commun. Conf. (GLOBECOM'08)
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
21
-
-
77956908999
-
Achieving secret communication for fast rayleigh fading channels
-
Sep
-
Z. Li, R. Yates, and W. Trappe, "Achieving secret communication for fast rayleigh fading channels", IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2792-2799, Sep. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.9
, pp. 2792-2799
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
22
-
-
49549125198
-
A network coding approach to secret key distribution
-
Sep
-
P. Oliveira and J. Barros, "A network coding approach to secret key distribution", IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 414-423, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 414-423
-
-
Oliveira, P.1
Barros, J.2
-
23
-
-
0034229404
-
Network information flow
-
Jul
-
R. Ahlswede, N. Cai, S.-Y. Li, and R. Yeung, "Network information flow", IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.3
Yeung, R.4
-
24
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditionalinformation
-
Mar
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditionalinformation", IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
25
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper", IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Aug. 2002. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
26
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification", IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
27
-
-
70449463810
-
Secure communication with a byzantine relay
-
Seoul, Korea, Jul
-
X. He and A. Yener, "Secure communication with a byzantine relay", in Proc. 2009 IEEE Int. Symp. Inf. Theory (ISIT'09), Seoul, Korea, Jul. 2009, pp. 2096-2100.
-
(2009)
Proc. 2009 IEEE Int. Symp. Inf. Theory (ISIT'09)
, pp. 2096-2100
-
-
He, X.1
Yener, A.2
-
28
-
-
70350504645
-
Optimal channel estimation and training design for two-way relay networks
-
Oct
-
F. Gao, R. Zhang, and Y. C. Liang, "Optimal channel estimation and training design for two-way relay networks", IEEE Trans. Commun., vol. 57, no. 10, pp. 3024-3033, Oct. 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.10
, pp. 3024-3033
-
-
Gao, F.1
Zhang, R.2
Liang, Y.C.3
-
29
-
-
78149429387
-
MIMO two-way amplify-and-forward relaying with imperfect receiver CSI
-
Nov
-
A. Y. Panah and R. W. Heath, "MIMO two-way amplify-and-forward relaying with imperfect receiver CSI", IEEE Trans. Veh. Technol., vol. 59, no. 9, pp. 4377-4387, Nov. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.9
, pp. 4377-4387
-
-
Panah, A.Y.1
Heath, R.W.2
-
30
-
-
78650372707
-
Relay selection with ANC and TDBC protocols in bidirectional relay networks
-
Dec
-
M. Ju and I.-M. Kim, "Relay selection with ANC and TDBC protocols in bidirectional relay networks", IEEE Trans. Commun., vol. 58, no. 12, pp. 3500-3511, Dec. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.12
, pp. 3500-3511
-
-
Ju, M.1
Kim, I.-M.2
-
31
-
-
84926091624
-
-
Cambridge, U. K.: Cambridge Univ. Press
-
E. Biglieri, R. Calderbank, A. Constantinides, A. Goldsmith, and A. P. H. V. Poor, MIMO Wireless Communications. Cambridge, U. K.: Cambridge Univ. Press, 2007.
-
(2007)
MIMO Wireless Communications.
-
-
Biglieri, E.1
Calderbank, R.2
Constantinides, A.3
Goldsmith, A.4
Poor, A.P.H.V.5
-
32
-
-
4544304392
-
A MIMO system with reciprocal transceivers for the time-division duplex mode
-
Monterey, CA, Jun
-
V. Jungnickel, U. Kruger, G. Istoc, T. Haustein, and C. von Helmolt, "A MIMO system with reciprocal transceivers for the time-division duplex mode", in Proc. 2004 IEEE Antennas Propag. Soc. Int. Symp., Monterey, CA, Jun. 2004, vol. 2, pp. 1267-1270.
-
(2004)
Proc. 2004 IEEE Antennas Propag. Soc. Int. Symp.
, vol.2
, pp. 1267-1270
-
-
Jungnickel, V.1
Kruger, U.2
Istoc, G.3
Haustein, T.4
Von Helmolt, C.5
-
33
-
-
79851480049
-
Performance analysis of antenna array calibration and its impact on beamforming: A survey
-
Beijing, China, Aug
-
C. Zhang, J. Ni, Y. Han, and G. Du, "Performance analysis of antenna array calibration and its impact on beamforming: A survey", in Proc. 5th Int. ICST Conf. Commun. Netw. in China (CHINACOM'10), Beijing, China, Aug. 2010, pp. 1-5.
-
(2010)
Proc. 5th Int. ICST Conf. Commun. Netw. in China (CHINACOM'10)
, pp. 1-5
-
-
Zhang, C.1
Ni, J.2
Han, Y.3
Du, G.4
-
34
-
-
62449208914
-
Synchronization of cooperative base stations
-
Reykjavik, Iceland, Oct
-
V. Jungnickel, T. Wirth, M. Schellmann, T. Haustein, and W. Zirwas, "Synchronization of cooperative base stations", in Proc. 5th IEEE Int. Symp. Wireless Commun. Systems (ISWCS'08), Reykjavik, Iceland, Oct. 2008, pp. 329-334.
-
(2008)
Proc. 5th IEEE Int. Symp. Wireless Commun. Systems (ISWCS'08)
, pp. 329-334
-
-
Jungnickel, V.1
Wirth, T.2
Schellmann, M.3
Haustein, T.4
Zirwas, W.5
-
35
-
-
39749164774
-
Estimating mutual information
-
Jun
-
A. Kraskov, H. Stögbauer, and P. Grassberger, "Estimating mutual information", Phys. Rev. E, vol. 69, no. 6, p. 066138, Jun. 2004.
-
(2004)
Phys. Rev. E
, vol.69
, Issue.6
, pp. 066138
-
-
Kraskov, A.1
Stögbauer, H.2
Grassberger, P.3
|