-
1
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in UWB channels
-
Sep.
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in UWB channels," IEEE Trans. Inform. Forensics and Security, vol. 2, pp. 364-375, Sep. 2007.
-
(2007)
IEEE Trans. Inform. Forensics and Security
, vol.2
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
2
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Jun.
-
c. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inform. Forensics and Security, vol. 5, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inform. Forensics and Security
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
3
-
-
84858388451
-
A unified frame work for key agreement over wireless fading channels
-
Apr.
-
L. Lai, Y. Liang, and H. V. Poor, "A unified frame work for key agreement over wireless fading channels," IEEE Trans. Inform. Forensics and Security, vol. 7, pp. 480-490, Apr. 2012.
-
(2012)
IEEE Trans. Inform. Forensics and Security
, vol.7
, pp. 480-490
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
4
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
Jul.
-
R. Ahlswede and 1. Csiszar, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar2
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
6
-
-
80051749392
-
Physical-layer secret key agreement in two-way wireless relaying
-
Sep.
-
T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying," IEEE Trans. Inform. Forensics and Security, vol. 6, pp. 650-660, Sep. 2011.
-
(2011)
IEEE Trans. Inform. Forensics and Security
, vol.6
, pp. 650-660
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
-
7
-
-
84865493080
-
Cooperative key generation in wireless network
-
Sep.
-
L. Lai, Y. Liang, and W. Du, "Cooperative key generation in wireless network," IEEE Journal on Selected Areas in Communications, vol. 30, pp. 1578-1588, Sep. 2012.
-
(2012)
IEEE Journal on Selected Areas in Communications
, vol.30
, pp. 1578-1588
-
-
Lai, L.1
Liang, Y.2
Du, W.3
-
9
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
c. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
10
-
-
84881516244
-
-
Cambridge University Press, seventh printing with corrections 2009 ed.
-
S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, seventh printing with corrections 2009 ed., 2004.
-
(2004)
Convex Optimization
-
-
Boyd, S.1
Vandenberghe, L.2
-
11
-
-
39749164774
-
Estimating mutual information
-
Jun.
-
A. Kraskov, H. Stogbauer, and P. Grassberger, "Estimating mutual information," Phys. Rev. E, vol. 69, p. 066138, Jun. 2004.
-
(2004)
Phys. Rev. e
, vol.69
, pp. 066138
-
-
Kraskov, A.1
Stogbauer, H.2
Grassberger, P.3
|