-
1
-
-
84858388451
-
A unified framework for key agreement over wireless fading channels
-
Apr.
-
L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inform. Forensics and Security, vol. 7, pp. 480-490, Apr. 2012.
-
(2012)
IEEE Trans. Inform. Forensics and Security
, vol.7
, pp. 480-490
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
2
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sept.
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inform. Forensics and Security, vol. 2, pp. 364-375, Sept. 2007.
-
(2007)
IEEE Trans. Inform. Forensics and Security
, vol.2
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
3
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
(Seoul, Korea), Jun.
-
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. IEEE Intl. Symposium on Inform. Theory, (Seoul, Korea), Jun. 2009.
-
(2009)
Proc. IEEE Intl. Symposium on Inform. Theory
-
-
Chou, T.-H.1
Sayeed, A.M.2
Draper, S.C.3
-
4
-
-
77952604175
-
Information-theoretic key generation from wireless channels
-
Jun.
-
C. Ye, S. Mathur, A. Reznik, W. Trappe, and N. Mandayam, "Information-theoretic key generation from wireless channels," IEEE Trans. Inform. Forensics and Security, vol. 5, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inform. Forensics and Security
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Trappe, W.4
Mandayam, N.5
-
5
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inform. Theory, vol. 50, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
78649346776
-
Secret key generation for a pairwise independent network model
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret key generation for a pairwise independent network model," IEEE Trans. Inform. Theory, vol. 56, no. 12, pp. 6482-6489, 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.12
, pp. 6482-6489
-
-
Nitinawarat, S.1
Ye, C.2
Barg, A.3
Narayan, P.4
Reznik, A.5
-
7
-
-
51649130417
-
Group secret key generation algorithms
-
(Nice, France) Jun.
-
C. Ye and A. Reznik, "Group secret key generation algorithms," in Proc. IEEE Intl. Symposium on Inform. Theory, (Nice, France), pp. 2896-2900, Jun. 2007.
-
(2007)
Proc. IEEE Intl. Symposium on Inform. Theory
, pp. 2896-2900
-
-
Ye, C.1
Reznik, A.2
-
9
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
10
-
-
0000703001
-
Multi-commodity network flows
-
May
-
T. Hu, "Multi-commodity network flows," Operations Research, vol. 11, pp. 344-360, May 1963.
-
(1963)
Operations Research
, vol.11
, pp. 344-360
-
-
Hu, T.1
-
11
-
-
0030127682
-
Appoximate max-flow min-(multi)cut theorems and their applications
-
Apr.
-
N. Garg, V. Vazirani, and M. Yannakakis, "Appoximate max-flow min-(multi)cut theorems and their applications," SIAM Journal on Computing, vol. 25, pp. 235-251, Apr. 1996.
-
(1996)
SIAM Journal on Computing
, vol.25
, pp. 235-251
-
-
Garg, N.1
Vazirani, V.2
Yannakakis, M.3
|