-
1
-
-
76249088301
-
A unified framework for key agreement over wireless fading channels
-
Taormina, Sicily, Italy, Oct.
-
L. Lai and H. V. Poor, "A unified framework for key agreement over wireless fading channels," in Proc. IEEE Inform. Theory Workshop, Taormina, Sicily, Italy, Oct. 2009.
-
(2009)
Proc. IEEE Inform. Theory Workshop
-
-
Lai, L.1
Poor, H.V.2
-
2
-
-
79952401767
-
Key agreement over wireless fading channels with an active attacker
-
Monticello, IL, Sep.
-
L. Lai, Y. Liang, and H. V. Poor, "Key agreement over wireless fading channels with an active attacker," in Proc. 48th Allerton Conf. Communication, Control, Computing, Monticello, IL, Sep. 2010.
-
(2010)
Proc. 48th Allerton Conf. Communication, Control, Computing
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
4
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inform. Theory, vol. 54, no. 10., pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
5
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
6
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sep.
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inform. Forensics Security, vol. 2, no. 5, pp. 364-375, Sep. 2007.
-
(2007)
IEEE Trans. Inform. Forensics Security
, vol.2
, Issue.5
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
7
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
Seoul, Korea, Jun.
-
T.-H. Chou, A.M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. IEEE Int. Symp. Inform. Theory, Seoul, Korea, Jun. 2009.
-
(2009)
Proc. IEEE Int. Symp. Inform. Theory
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
8
-
-
77955675787
-
Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
-
Austin, TX, Jun.
-
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness," in Proc. IEEE Int. Symp. Inform. Theory, Austin, TX, Jun. 2010.
-
(2010)
Proc. IEEE Int. Symp. Inform. Theory
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
9
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
Las Vegas, NV, Apr.
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Las Vegas, NV, Apr. 2008.
-
(2008)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
-
-
Sayeed, A.1
Perrig, A.2
-
10
-
-
77952604175
-
Information- theoretic key generation from wireless channels
-
Jun.
-
C. Ye, S. Mathur, A. Reznik, W. Trappe, and N. Mandayam, "Information- theoretic key generation from wireless channels," IEEE Trans. Inform. Forensics Security, vol. 5, no. 3, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inform. Forensics Security
, vol.5
, Issue.3
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Trappe, W.4
Mandayam, N.5
-
11
-
-
60149097098
-
Radiotelephathy: Extracting a secret key froman unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelephathy: Extracting a secret key froman unauthenticated wireless channel," in Proc. ACM Int. Conf. Mobile Computing and Networking, 2008.
-
(2008)
Proc. ACM Int. Conf. Mobile Computing and Networking
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
12
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, no. 7, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.7
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
13
-
-
0037396695
-
Secret key agreement over a non-authenticated channel-Part I: Definitions and bounds
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel-Part I: Definitions and bounds," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
14
-
-
0037399113
-
Secret key agreement over a non-authenticated channel-Part II: The simulatability condition
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel-Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
15
-
-
0037396951
-
Secret key agreement over a non-authenticated channel-Part III: Privacy amplification
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel-Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
16
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inform. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
17
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov.
-
L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inform. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
18
-
-
77953802876
-
Secure transmission with multiple antennas- I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas- I: The MISOME wiretap channel," IEEE Trans. Inform. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
19
-
-
77958560746
-
Secure transmission with multiple antennas-II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-II: The MIMOME wiretap channel," IEEE Trans. Inform. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
20
-
-
0023310427
-
Gaussian arbitrarily varying channels
-
Mar.
-
B. Hughes and P. Narayan, "Gaussian arbitrarily varying channels," IEEE Trans. Inform. Theory, vol. 33, no. 3, pp. 267-284, Mar. 1987.
-
(1987)
IEEE Trans. Inform. Theory
, vol.33
, Issue.3
, pp. 267-284
-
-
Hughes, B.1
Narayan, P.2
-
21
-
-
0026055468
-
Capacity of the Gaussian arbitrarily varying channel
-
Jan.
-
I. Csiszár and P. Narayan, "Capacity of the Gaussian arbitrarily varying channel," IEEE Trans. Inform. Theory, vol. 37, no. 1, pp. 18-26, Jan. 1991.
-
(1991)
IEEE Trans. Inform. Theory
, vol.37
, Issue.1
, pp. 18-26
-
-
Csiszár, I.1
Narayan, P.2
-
22
-
-
0034188649
-
The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel
-
May
-
M. Médard, "The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel," IEEE Trans. Inform. Theory, vol. 46, no. 5, pp. 933-946, May 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.5
, pp. 933-946
-
-
Médard, M.1
-
23
-
-
0037399093
-
How much training is needed in multiple- antenna wireless links?
-
Apr.
-
B. Hassibi and B. M. Hochwald, "How much training is needed in multiple- antenna wireless links?," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 951-963, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 951-963
-
-
Hassibi, B.1
Hochwald, B.M.2
-
24
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar.
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, no. 3, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.3
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
25
-
-
0037356065
-
Distributed source coding using syndromes (DISCUS): Design and construction
-
Mar.
-
S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inform. Theory, no. 3, pp. 626-643, Mar. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, Issue.3
, pp. 626-643
-
-
Pradhan, S.1
Ramchandran, K.2
-
26
-
-
85032757506
-
Distributed source coding for sensor networks
-
May
-
Z. Xiong, A. Liveris, and S. Cheng, "Distributed source coding for sensor networks," IEEE Signal Processing Mag., vol. 21, pp. 80-94, May 2004.
-
(2004)
IEEE Signal Processing Mag.
, vol.21
, pp. 80-94
-
-
Xiong, Z.1
Liveris, A.2
Cheng, S.3
-
27
-
-
0020497622
-
The Gaussian test channel with an intelligent jammer
-
Jan.
-
T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Inform. Theory, vol. 29, no. 1, pp. 152-157, Jan. 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.1
, pp. 152-157
-
-
Basar, T.1
-
28
-
-
4143137728
-
Capacity of correlated jamming channels
-
Monticello, IL, Sep.
-
M. Médard, "Capacity of correlated jamming channels," in Proc. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 1997.
-
(1997)
Proc. Allerton Conf. Communication, Control, and Computing
-
-
Médard, M.1
-
29
-
-
4544354908
-
Correlated jamming on MIMO Gaussian fading channels
-
Sep.
-
A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.9
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
|