메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Key generation in two-way relay wireless channels

Author keywords

Information theoretic security; key generation; two way relay channel

Indexed keywords

CORRELATED OBSERVATIONS; INFORMATION-THEORETIC SECURITY; KEY GENERATION; LEGITIMATE USERS; MULTIPLE ANTENNA; OPTIMAL POWER ALLOCATION; TWO-WAY RELAY CHANNELS; WIRELESS FADING CHANNELS;

EID: 84881509221     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2013.6552319     Document Type: Conference Paper
Times cited : (4)

References (11)
  • 1
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in UWB channels
    • Sep.
    • R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in UWB channels," IEEE Trans. Inform. Forensics and Security, vol. 2, pp. 364-375, Sep. 2007.
    • (2007) IEEE Trans. Inform. Forensics and Security , vol.2 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 3
    • 84858388451 scopus 로고    scopus 로고
    • A unified frame work for key agreement over wireless fading channels
    • Apr.
    • L. Lai, Y. Liang, and H. V. Poor, "A unified frame work for key agreement over wireless fading channels," IEEE Trans. Inform. Forensics and Security, vol. 7, pp. 480-490, Apr. 2012.
    • (2012) IEEE Trans. Inform. Forensics and Security , vol.7 , pp. 480-490
    • Lai, L.1    Liang, Y.2    Poor, H.V.3
  • 4
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • Jul.
    • R. Ahlswede and 1. Csiszar, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar2
  • 5
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 6
    • 80051749392 scopus 로고    scopus 로고
    • Physical-layer secret key agreement in two-way wireless relaying
    • Sep.
    • T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying," IEEE Trans. Inform. Forensics and Security, vol. 6, pp. 650-660, Sep. 2011.
    • (2011) IEEE Trans. Inform. Forensics and Security , vol.6 , pp. 650-660
    • Shimizu, T.1    Iwai, H.2    Sasaoka, H.3
  • 9
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • c. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 10
    • 84881516244 scopus 로고    scopus 로고
    • Cambridge University Press, seventh printing with corrections 2009 ed.
    • S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, seventh printing with corrections 2009 ed., 2004.
    • (2004) Convex Optimization
    • Boyd, S.1    Vandenberghe, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.