-
1
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, pp. 355-580, 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
6
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
8
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
Jun
-
T.-. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. Int. Symp. Inform. Theory, Jun. 2009, pp. 2296-2300.
-
(2009)
Proc. Int. Symp. Inform. Theory
, pp. 2296-2300
-
-
Chou, T.1
Sayeed, A.M.2
Draper, S.C.3
-
9
-
-
84858994663
-
Key generation using external source excitation: Capacity, reliability and secrecy exponent
-
Ar
-
T.-H. Chou, S. C. Draper, and A. M. Sayeed, "Key generation using external source excitation: Capacity, reliability and secrecy exponent," IEEE Trans. Inf. Theory, vol. 58, no. 4, pp. 2455-2474, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.4
, pp. 2455-2474
-
-
Chou, T.-H.1
Draper, S.C.2
Sayeed, A.M.3
-
10
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R.Wilson, D. Tse, R. A. Scholtz, and L. Fellow, "Channel identification: Secret sharing using reciprocity in UWB channels," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pt. 1, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
11
-
-
47649111825
-
On the secrecy capabilities of ITU channels
-
Oct.
-
C. Ye, A. Reznik, G. Sternberg, and Y. Shah, "On the secrecy capabilities of ITU channels," in Proc. Vehic. Tech. Soc. Conf., Oct. 2007, pp. 2030-2034.
-
(2007)
Proc. Vehic. Tech. Soc. Conf.
, pp. 2030-2034
-
-
Ye, C.1
Reznik, A.2
Sternberg, G.3
Shah, Y.4
-
12
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. Int. Symp. Inform. Theory, Jul. 2006, pp. 2593-2597. (Pubitemid 351244572)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
13
-
-
52349088850
-
Secret key generation for correlated Gaussian sources
-
Jul.
-
S. Nitinawarat, "Secret key generation for correlated Gaussian sources," in Proc. Int. Symp. Inform. Theory, Jul. 2007, pp. 702-706.
-
(2007)
Proc. Int. Symp. Inform. Theory
, pp. 702-706
-
-
Nitinawarat, S.1
-
14
-
-
77955675787
-
Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
-
Jun.
-
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness," in Proc. Int. Symp. Inform. Theory, Jun. 2010, pp. 2518-2522.
-
(2010)
Proc. Int. Symp. Inform. Theory
, pp. 2518-2522
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
15
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
16
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.1
Wolf, S.2
-
17
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
19
-
-
80051723522
-
Noncoherent capacity of secret-key agreement with public discussion
-
Se
-
A. Agrawal, Z. Rezki, A. J. Khisti, and M. Alouini, "Noncoherent capacity of secret-key agreement with public discussion," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pt. 1, pp. 565-574, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3 PART 1
, pp. 565-574
-
-
Agrawal, A.1
Rezki, Z.2
Khisti, A.J.3
Alouini, M.4
-
20
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan
-
J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
21
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
A. A. Hassan,W. E. Stark, J. E. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Process., vol. 6, pp. 207-212, 1996. (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
22
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
Jun.
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel," ACM MobiCom, pp. 128-139, Jun. 2008.
-
(2008)
ACM MobiCom
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
23
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Jun
-
C.Ye, S.Mathur,A. Reznik,Y. Shah, W. Trappe, and N. B. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Theory, vol. 5, no. 2, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
24
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Sep.
-
S. Jana, S. N. Premnath, M. Clark, and S. K. Kasera, "On the effectiveness of secret key extraction from wireless signal strength in real environments," ACM MobiCom, pp. 321-332, Sep. 2009.
-
(2009)
ACM MobiCom
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
-
25
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
Jun.
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, "Proximate: Proximity-based secure pairing using ambient wireless signals," ACM MobiSys, pp. 211-224, Jun. 2011.
-
(2011)
ACM MobiSys
, pp. 211-224
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
26
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
DOI 10.1109/ICC.2007.767, 4289438, 2007 IEEE International Conference on Communications, ICC'07
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," in Proc. Int. Conf. Commun., Jun. 2007, pp. 4646-4651. (Pubitemid 351146262)
-
(2007)
IEEE International Conference on Communications
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
27
-
-
48149115694
-
Using the physical layer for wireless authentication under time-variant channels
-
Jul
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication under time-variant channels," IEEE Trans.Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
-
(2008)
IEEE Trans.Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
28
-
-
84866266156
-
Secure spaces: Location-based secure group communication for wireless networks
-
Sep
-
S. Banerjee and A. Mishra, "Secure spaces: Location-based secure group communication for wireless networks," ACM MobiCom, vol. 7, pp. 68-70, Sep. 2002.
-
(2002)
ACM MobiCom
, vol.7
, pp. 68-70
-
-
Banerjee, S.1
Mishra, A.2
-
29
-
-
77955667690
-
Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis
-
Se
-
J. W. Wallace and R. K. Sharma, "Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis," IEEE Trans. Inf. Forenics Security, vol. 5, no. 3, pp. 381-392, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forenics Security
, vol.5
, Issue.3
, pp. 381-392
-
-
Wallace, J.W.1
Sharma, R.K.2
-
32
-
-
77951098595
-
Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM
-
Dec.
-
S. Yasukawa, H. Iwai, and H. Sasaoka, "Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM," in Proc. Int. Symp. Inform. Theory, Dec. 2008, pp. 7-10.
-
(2008)
Proc. Int. Symp. Inform. Theory
, pp. 7-10
-
-
Yasukawa, S.1
Iwai, H.2
Sasaoka, H.3
-
34
-
-
74549208614
-
On key agreement in wireless sensor networks based on radio transmission properties
-
Oct.
-
M. Wilhelm, I. Martinovic, and J. B. Schmitt, "On key agreement in wireless sensor networks based on radio transmission properties," in Proc. Sec. Netwk. Protoc. Workshop, Oct. 2009, pp. 37-42.
-
(2009)
Proc. Sec. Netwk. Protoc. Workshop
, pp. 37-42
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
-
35
-
-
84885496929
-
Wireless communication and sensing in multipath environments using multi-antenna transceivers
-
S. Haykin and K. J. R. Liu, Eds. Hoboken, NJ: Wiley, Apr. ch. 5
-
A. M. Sayeed and T. Sivanadyan, "Wireless communication and sensing in multipath environments using multi-antenna transceivers," in Handbook on Array Processing and Sensor Networks, S. Haykin and K. J. R. Liu, Eds. Hoboken, NJ: Wiley, Apr. 2010, ch. 5.
-
(2010)
Handbook on Array Processing and Sensor Networks
-
-
Sayeed, A.M.1
Sivanadyan, T.2
-
36
-
-
9444241599
-
OFDM systems in the presence of phase noise: Consequences and solutions
-
Nov
-
S. Wu and Y. Bar-Ness, "OFDM systems in the presence of phase noise: consequences and solutions," IEEE Trans. Commun., vol. 52, no. 11, pp. 1988-1996, Nov. 2004.
-
(2004)
IEEE Trans. Commun.
, vol.52
, Issue.11
, pp. 1988-1996
-
-
Wu, S.1
Bar-Ness, Y.2
-
38
-
-
67349267981
-
Moments of the product and ratio of two correlated chisquare variables
-
Mar.
-
A. Joarder, "Moments of the product and ratio of two correlated chisquare variables," Statistical Papers, vol. 50, pp. 581-592, Mar. 2009.
-
(2009)
Statistical Papers
, vol.50
, pp. 581-592
-
-
Joarder, A.1
-
39
-
-
52349098088
-
Feature extraction for a Slepian-Wolf biometric system using LDPC codes
-
Jul.
-
Y. Sutcu, S. Rane, J. S. Yedidia, S. Draper, and A. Vetro, "Feature extraction for a Slepian-Wolf biometric system using LDPC codes," in Proc. Int. Symp. Inform. Theory, Jul. 2010, pp. 2297-2301.
-
(2010)
Proc. Int. Symp. Inform. Theory
, pp. 2297-2301
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.S.3
Draper, S.4
Vetro, A.5
-
40
-
-
0035246564
-
Factor graphs and the sum-product algorithm
-
DOI 10.1109/18.910572, PII S0018944801007210
-
F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, "Factor graphs and the sum-product algorithm," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 498-519, Feb. 2001. (Pubitemid 32318087)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.2
, pp. 498-519
-
-
Kschischang, F.R.1
Frey, B.J.2
Loeliger, H.-A.3
-
41
-
-
0015648934
-
Noiseless coding of correlated information sources
-
Jul
-
D. Slepian and J. K.Wolf, "Noiseless coding of correlated information sources," IEEETrans. Inf. Theory, vol. 19, no. 4, pp. 471-480, Jul. 1973.
-
(1973)
IEEETrans. Inf. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
42
-
-
0036955307
-
A phase noise suppression algorithm for OFDM-based WLANs
-
Dec
-
S. Wu and Y. Bar-Ness, "A phase noise suppression algorithm for OFDM-based WLANs," IEEE Commun. Lett., vol. 6, no. 12, pp. 535-537, Dec. 2002.
-
(2002)
IEEE Commun. Lett.
, vol.6
, Issue.12
, pp. 535-537
-
-
Wu, S.1
Bar-Ness, Y.2
-
44
-
-
0036611573
-
Spectral efficiency in the wideband regime
-
DOI 10.1109/TIT.2002.1003824, PII S0018944802040270
-
S. Verdu, "Spectral efficiency in the wideband regime," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1319-1343, Jun. 2002. (Pubitemid 34759847)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1319-1343
-
-
Verdu, S.1
-
45
-
-
0035246127
-
Design of capacity-approaching irregular low-density parity-check codes
-
DOI 10.1109/18.910578, PII S0018944801007386
-
T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, "Design of capacity-approaching irregular low-density parity-check codes," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 619-637, Feb. 2001. (Pubitemid 32318093)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.2
, pp. 619-637
-
-
Richardson, T.J.1
Shokrollahi, M.A.2
Urbanke, R.L.3
|