-
1
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
San Diego, CA, Jan.
-
T. Chou, A. Sayeed, and S. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. Workshop on Inf. Theory Appl., San Diego, CA, Jan. 2009.
-
(2009)
Proc. Workshop on Inf. Theory Appl.
-
-
Chou, T.1
Sayeed, A.2
Draper, S.3
-
2
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
Seoul, Korea, Jun.
-
T. Chou, A. Sayeed, and S. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. IEEE Int. Symp. Inf. Theory(ISIT 2009), Seoul, Korea, Jun. 2009.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory(ISIT 2009)
-
-
Chou, T.1
Sayeed, A.2
Draper, S.3
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, M.U.1
-
7
-
-
0027629488
-
Common randomness in information theory and cryptography Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
8
-
-
0015648934
-
Noiseless coding of correlated information sources
-
Jul.
-
D. Slepian and J. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. 19, pp. 471-480, Jul. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.2
-
11
-
-
0025485582
-
On channel capacity per unit cost
-
DOI 10.1109/18.57201
-
S. Verdu, "On channel capacity per unit cost," IEEE Trans. Inf. Theory, vol. 36, pp. 1019-1030, Sep. 1990. (Pubitemid 20738361)
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.5
, pp. 1019-1030
-
-
Verdu Sergio1
-
12
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. IEEE Int. Symp. Inf. Theory Inf. Theory (2006) , Jul. 2006, pp. 2593-2597. (Pubitemid 351244572)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
13
-
-
45249118588
-
Secret key generation for correlated Gaussian sources
-
S. Nitinawarat, "Secret key generation for correlated Gaussian sources," in Proc. 45th Ann. Allerton Conf., 2007.
-
(2007)
Proc. 45th Ann. Allerton Conf.
-
-
Nitinawarat, S.1
-
14
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
A. A. Hassan, W. E. Stark, J. E. Hersheyc, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digit. Signal Process., vol. 6, pp. 207-212, Oct. 1996. (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
15
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
Las Vegas, NV
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE Int. Conf. ICASSP 2008, Las Vegas, NV, 2008, pp. 3013-3016.
-
(2008)
Proc. IEEE Int. Conf. ICASSP
, vol.2008
, pp. 3013-3016
-
-
Sayeed, A.1
Perrig, A.2
-
16
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forens. Secur., vol. 2, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
17
-
-
47649111825
-
On the secrecy capabilities of ITU channels
-
Sep.
-
C. Ye, A. Reznik, G. Sternberg, and Y. Shah, "On the secrecy capabilities of ITU channels," in Proc. IEEE 66th Veh. Technol. Conf. (VTC 2007 Fall), Sep. 2007, pp. 2030-2034.
-
(2007)
Proc. IEEE 66th Veh. Technol. Conf. (VTC 2007 Fall)
, pp. 2030-2034
-
-
Ye, C.1
Reznik, A.2
Sternberg, G.3
Shah, Y.4
-
18
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Jun.
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Forens. Secur., vol. 5, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forens. Secur.
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.6
-
19
-
-
70349883977
-
Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits
-
Mar.
-
J.Wallace, C. Chen, andM. Jensen, "Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits," in Proc. 3rd Eur. Conf. Antennas Propag. (EuCAP 2009), Mar. 2009, pp. 1499-1503.
-
(2009)
Proc. 3rd Eur. Conf. Antennas Propag. (EuCAP 2009)
, pp. 1499-1503
-
-
Wallace, J.1
Chen, C.2
Jensen, M.3
-
20
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan.
-
N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mobile Comput., vol. 9, pp. 17-30, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, K.S.4
-
21
-
-
45249104850
-
Wireless information- theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information- theoretic security," IEEE Trans. Inf. Theory, vol. 54, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
22
-
-
52349090484
-
Secret-key generation with correlated sources and noisy channels
-
Jul.
-
A. Khisti, S. Diggavi, and G. Wornell, "Secret-key generation with correlated sources and noisy channels," in Proc. IEEE Int. Symp. Inf. Theory (ISIT 2008), Jul. 2008, pp. 1005-1009.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory (ISIT 2008)
, pp. 1005-1009
-
-
Khisti, A.1
Diggavi, S.2
Wornell, G.3
-
25
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
26
-
-
79957636296
-
Exponential decreasing rate of leaked information in universal random privacy amplification
-
Jun.
-
M. Hayashi, "Exponential decreasing rate of leaked information in universal random privacy amplification," IEEE Trans. Inf. Theory, vol. 57, pp. 3989-4001, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, pp. 3989-4001
-
-
Hayashi, M.1
-
27
-
-
0023985539
-
Privacy amplification by public discussion
-
Apr.
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, Apr. 1988.
-
(1988)
SIAM J. Comput.
, vol.17
-
-
Bennett, H.C.1
Brassard, G.2
Robert, M.-J.3
-
28
-
-
33947666069
-
Channel coherence in the low- SNRregime
-
Mar.
-
L. Zheng, D. N. C. Tse, andM.Medard, "Channel coherence in the low- SNRregime," IEEETrans. Inf.Theory, vol. 53, pp. 976-997, Mar. 2007.
-
(2007)
IEEETrans. Inf.Theory
, vol.53
, pp. 976-997
-
-
Zheng, L.1
Tse, C.N.D.2
Medard, M.3
-
29
-
-
35348921801
-
Capacity of sparse multipath channels in the ultra-wideband regime
-
DOI 10.1109/JSTSP.2007.906666
-
V. Raghavan, G. Hariharan, and A. Sayeed, "Capacity of sparse multipath channels in the ultra-wideband regime," IEEE J. Sel. Topics Signal Process., vol. 1, pp. 357-371, Oct. 2007. (Pubitemid 47570254)
-
(2007)
IEEE Journal on Selected Topics in Signal Processing
, vol.1
, Issue.3
, pp. 357-371
-
-
Raghavan, V.1
Hariharan, G.2
Sayeed, A.M.3
|