-
1
-
-
76249088301
-
A unified framework for key agreement over wireless fading channels
-
L. Lai and H. V. Poor, "A unified framework for key agreement over wireless fading channels," in Proc. IEEE Inform. Theory Workshop, (Taormina, Sicily, Italy), Oct. 2009.
-
Proc. IEEE Inform. Theory Workshop, (Taormina, Sicily, Italy), Oct. 2009
-
-
Lai, L.1
Poor, H.V.2
-
2
-
-
79952401767
-
Key agreement over wireless fading channels with an active attacker
-
L. Lai, Y. Liang, and H. V. Poor, "Key agreement over wireless fading channels with an active attacker," in Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sept. 2010.
-
Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sept. 2010
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
3
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inform. Forensics and Security, vol. 2, pp. 364-375, Sept. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
4
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. IEEE Intl. Symposium on Inform. Theory, (Seoul, Korea), Jun. 2009.
-
Proc. IEEE Intl. Symposium on Inform. Theory, (Seoul, Korea), Jun. 2009
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
5
-
-
77955675787
-
Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
-
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness," in Proc. IEEE Intl. Symposium on Inform. Theory, (Austin, TX), Jun. 2010.
-
Proc. IEEE Intl. Symposium on Inform. Theory, (Austin, TX), Jun. 2010
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
6
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Las Vegas, NV), Apr. 2008.
-
Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Las Vegas, NV), Apr. 2008
-
-
Sayeed, A.1
Perrig, A.2
-
7
-
-
77952604175
-
Information-theoretic key generation from wireless channels
-
Jun.
-
C. Ye, S. Mathur, A. Reznik, W. Trappe, and N. Mandayam, "Information-theoretic key generation from wireless channels," IEEE Trans. Inform. Forensics and Security, vol. 5, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inform. Forensics and Security
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Trappe, W.4
Mandayam, N.5
-
8
-
-
60149097098
-
Radiotelephathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelephathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. ACM International Conference on Mobile Computing and Networking, 2008.
-
Proc. ACM International Conference on Mobile Computing and Networking, 2008
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
9
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared key generation in wireless networks
-
K. Zeng, D. Wu, A. Chan, and P. Mohapatra, "Exploiting multiple-antenna diversity for shared key generation in wireless networks," in Proc. IEEE Conf. Computer Communications (Infocom), (San Diego, CA), Mar. 2010.
-
Proc. IEEE Conf. Computer Communications (Infocom), (San Diego, CA), Mar. 2010
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
12
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
13
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
14
-
-
29144473358
-
On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels
-
DOI 10.1109/TIT.2005.858920
-
K. Azarian, H. El Gamal, and P. Schniter, "On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels," IEEE Trans. Inform. Theory, vol. 51, pp. 4152-4172, Dec. 2005. (Pubitemid 41800350)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.12
, pp. 4152-4172
-
-
Azarian, K.1
El, G.H.2
Schniter, P.3
|