-
1
-
-
84856094320
-
PHY-Based cooperative key generation in wireless networks
-
Sept.
-
L. Lai, Y. Liang, and K. Du, "PHY-Based cooperative key generation in wireless networks", in Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sept. 2011.
-
(2011)
Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL)
-
-
Lai, L.1
Liang, Y.2
Du, K.3
-
2
-
-
76249088301
-
A unified framework for key agreement over wireless fading channels
-
Oct.
-
L. Lai and H. V. Poor, "A unified framework for key agreement over wireless fading channels", in Proc. IEEE Inform. Theory Workshop, (Taormina, Sicily, Italy), Oct. 2009.
-
(2009)
Proc. IEEE Inform. Theory Workshop, (Taormina, Sicily, Italy)
-
-
Lai, L.1
Poor, H.V.2
-
3
-
-
79952401767
-
Key agreement over wireless fading channels with an active attacker
-
Sept.
-
L. Lai, Y. Liang, and H. V. Poor, "Key agreement over wireless fading channels with an active attacker", in Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sept. 2010.
-
(2010)
Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL)
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
4
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels", IEEE Trans. Inf. Forens. Security, vol. 2, pp. 364-375, Sept. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
5
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
Jun.
-
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels", in Proc. IEEE Intl. Symposium on Inform. Theory, (Seoul, Korea), Jun. 2009.
-
(2009)
Proc. IEEE Intl. Symposium on Inform. Theory, (Seoul, Korea)
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
6
-
-
77955675787
-
Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
-
Jun.
-
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness", in Proc. IEEE Intl. Symposium on Inform. Theory, (Austin, TX), Jun. 2010.
-
(2010)
Proc. IEEE Intl. Symposium on Inform. Theory, (Austin, TX)
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
7
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
Apr.
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath", in Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Las Vegas, NV), Apr. 2008.
-
(2008)
Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Las Vegas, NV)
-
-
Sayeed, A.1
Perrig, A.2
-
8
-
-
77952604175
-
Information-theoretic key generation from wireless channels
-
Jun.
-
C. Ye, S. Mathur, A. Reznik, W. Trappe, and N. Mandayam, "Information-theoretic key generation from wireless channels", IEEE Trans. Inf. Forens. Security, vol. 5, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forens. Security
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Trappe, W.4
Mandayam, N.5
-
9
-
-
60149097098
-
Radiotelephathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelephathy: Extracting a secret key from an unauthenticated wireless channel", in Proc. ACM International Conference on Mobile Computing and Networking, (San Francisco, CA), 2008.
-
(2008)
Proc. ACM International Conference on Mobile Computing and Networking, (San Francisco, CA)
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
10
-
-
77953297543
-
Exploiting multipleantenna diversity for shared key generation in wireless networks
-
Mar.
-
K. Zeng, D. Wu, A. Chan, and P. Mohapatra, "Exploiting multipleantenna diversity for shared key generation in wireless networks", in Proc. IEEE Conf. Computer Communications (Infocom), (San Diego, CA), Mar. 2010.
-
(2010)
Proc. IEEE Conf. Computer Communications (Infocom), (San Diego, CA)
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
12
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography, Part I: Secret sharing", IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csisźar, I.2
-
13
-
-
26444619804
-
Cooperative strategies and capacity theorems for relay networks
-
DOI 10.1109/TIT.2005.853304
-
G. Kramer, M. Gastpar, and P. Gupta, "Cooperative strategies and capacity theorems for relay networks", IEEE Trans. Inf. Theory, vol. 51, pp. 3037-3063, Sep. 2005. (Pubitemid 41430974)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.9
, pp. 3037-3063
-
-
Kramer, G.1
Gastpar, M.2
Gupta, P.3
-
14
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior", IEEE Trans. Inf. Theory, vol. 50, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
16
-
-
84858388451
-
A unified framework for key agreement over wireless fading channels
-
Apr.
-
L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels", IEEE Trans. Inf. Forens. Security, vol. 7, pp. 480-490, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, pp. 480-490
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
17
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csisźar and P. Narayan, "Common randomness and secret key generation with a helper", IEEE Trans. Inf. Theory, vol. 46, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
18
-
-
29144473358
-
On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels
-
DOI 10.1109/TIT.2005.858920
-
K. Azarian, H. El Gamal, and P. Schniter, "On the achievable diversitymultiplexing tradeoff in half-duplex cooperative channels", IEEE Trans. Inf. Theory, vol. 51, pp. 4152-4172, Dec. 2005. (Pubitemid 41800350)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.12
, pp. 4152-4172
-
-
Azarian, K.1
El Gamal, H.2
Schniter, P.3
|