-
1
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-652, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-652
-
-
Diffie, W.1
Hellman, M.E.2
-
2
-
-
0018443381
-
Privacy and authentication: An introduction to cryptography
-
Mar
-
W. Diffie and M. E. Hellman, "Privacy and authentication: An introduction to cryptography," Proc. IEEE, vol. 67, no. 3, pp. 397-427, Mar. 1979.
-
(1979)
Proc. IEEE
, vol.67
, Issue.3
, pp. 397-427
-
-
Diffie, W.1
Hellman, M.E.2
-
3
-
-
0024012644
-
An introduction to contemporary cryptology
-
May
-
J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 533-549
-
-
Massey, J.L.1
-
4
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
6
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
8
-
-
0027629488
-
Common randomness in information theory and cryptography- Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography- Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
9
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733- 742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
10
-
-
84857724638
-
Percolation and connectivity in the intrinsically secure communications graph
-
Mar
-
P. C. Pinto and M. Z. Win, "Percolation and connectivity in the intrinsically secure communications graph," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1716-1730, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1716-1730
-
-
Pinto, P.C.1
Win, M.Z.2
-
11
-
-
52349086199
-
The secrecy graph and some of its properties
-
Toronto, ON Jul.
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, Jul. 2008, pp. 539-543.
-
(2008)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 539-543
-
-
Haenggi, M.1
-
12
-
-
84860255627
-
On secrecy capacity scaling in wireless networks
-
May
-
O. O. Koyluoglu, C. E. Koksal, and H. El Gamal, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
El Gamal, H.3
-
13
-
-
84883430599
-
Distributed network secrecy
-
Sep
-
J. Lee, A. Conti, A. Rabbachin, and M. Z. Win, "Distributed network secrecy," IEEE J. Sel. Areas Commun., vol. 31, no. 9, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
-
-
Lee, J.1
Conti, A.2
Rabbachin, A.3
Win, M.Z.4
-
14
-
-
84871964981
-
The role of aggregate interference on intrinsic network secrecy
-
Ottawa, ON, Jun.
-
A. Rabbachin, A. Conti, and M. Z. Win, "The role of aggregate interference on intrinsic network secrecy," in Proc. IEEE Int. Conf. Commun., Ottawa, ON, Jun. 2012, pp. 3548-3553.
-
(2012)
Proc. IEEE Int. Conf. Commun.
, pp. 3548-3553
-
-
Rabbachin, A.1
Conti, A.2
Win, M.Z.3
-
15
-
-
0033097504
-
Unconditionally secure key agreement and intrinsic conditional information
-
Mar
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
16
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology- EUROCRYPT 2000, vol. 1807. Springer-Verlag, 2000, pp. 351-368.
-
(2000)
Advances in Cryptology- EUROCRYPT 2000
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
17
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec
-
I. Csiszar and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszar, I.1
Narayan, P.2
-
18
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun
-
"Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
-
19
-
-
52349096793
-
Secret key generation for a pairwise independent network model
-
Toronto, ON Jul.
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret key generation for a pairwise independent network model," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, Jul. 2008, pp. 1015-1019.
-
(2008)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 1015-1019
-
-
Nitinawarat, S.1
Ye, C.2
Barg, A.3
Narayan, P.4
Reznik, A.5
-
20
-
-
84858388451
-
A unified framework for key agreement over wireless fading channels
-
Apr
-
L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inf. Forens. Security, vol. 7, no. 2, pp. 480-490, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.2
, pp. 480-490
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
21
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
22
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
23
-
-
52349113391
-
Secrecy in cooperative relay broadcast channels
-
Toronto, ON Jul.
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, Jul. 2008, pp. 2217-2221.
-
(2008)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 2217-2221
-
-
Ekrem, E.1
Ulukus, S.2
-
24
-
-
45249119255
-
Secure communication over fading channels
-
Jun
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
25
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdu, S.5
-
26
-
-
70350706020
-
The capacity region of the degraded multiple-input multiple-output compound broadcast channel
-
Nov
-
H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 5011-5023
-
-
Weingarten, H.1
Liu, T.2
Shamai, S.3
Steinberg, Y.4
Viswanath, P.5
-
27
-
-
79957667257
-
Interference alignment for secrecy
-
Jun
-
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.4
-
28
-
-
0040801465
-
Reciprocity theorems for electromagnetic fields whose time dependence is arbitrary
-
Jan
-
W. J. Welch, "Reciprocity theorems for electromagnetic fields whose time dependence is arbitrary," IRE Trans. Antennas Propagat., vol. 8, no. 1, pp. 68-73, Jan. 1960.
-
(1960)
IRE Trans. Antennas Propagat.
, vol.8
, Issue.1
, pp. 68-73
-
-
Welch, W.J.1
-
30
-
-
2942715331
-
A direct derivation of a single-antenna reciprocity relation for the time-domain
-
Jun
-
G. S. Smith, "A direct derivation of a single-antenna reciprocity relation for the time-domain," IEEE Trans. Antennas Propag., vol. 52, no. 6, pp. 1568-1577, Jun. 2004.
-
(2004)
IEEE Trans. Antennas Propag.
, vol.52
, Issue.6
, pp. 1568-1577
-
-
Smith, G.S.1
-
31
-
-
33750086918
-
Time reversal with MISO for ultrawideband communications: Experimental results
-
Dec
-
R. C. Qiu, C. Zhou, N. Guo, and J. Q. Zhang, "Time reversal with MISO for ultrawideband communications: Experimental results," IEEE Antennas Wireless Propag. Lett., vol. 5, no. 1, pp. 269-273, Dec. 2006.
-
(2006)
IEEE Antennas Wireless Propag. Lett.
, vol.5
, Issue.1
, pp. 269-273
-
-
Qiu, R.C.1
Zhou, C.2
Guo, N.3
Zhang, J.Q.4
-
32
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Process., vol. 6, no. 4, pp. 207-212, Oct. 1996. (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
33
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan
-
J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
34
-
-
0035727429
-
Unconditionally secure communications over fading channels
-
M. A. Tope and J. C. McEachen, "Unconditionally secure communications over fading channels," in Proc. Military Commun. Conf., Vienna, VA, Oct. 2001, pp. 54-58. (Pubitemid 34278968)
-
(2001)
Proceedings - IEEE Military Communications Conference MILCOM
, vol.1
, pp. 54-58
-
-
Tope, M.A.1
McEachen, J.C.2
-
35
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forens. Security, vol. 2, no. 3, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
36
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
Alexandria, VA Oct.
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. ACM Comput. Commun. Security, Alexandria, VA, Oct. 2007, pp. 401-410.
-
(2007)
Proc. ACM Comput. Commun. Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
37
-
-
70449499345
-
Verification of secret key generation from UWB channel observations
-
Dresden, Germany, Jun.
-
M. G. Madiseh, S. He, M. L. McGuire, S. W. Neville, and X. Dong, "Verification of secret key generation from UWB channel observations," in Proc. IEEE Int. Conf. Commun., Dresden, Germany, Jun. 2009, pp. 1-5.
-
(2009)
Proc. IEEE Int. Conf. Commun.
, pp. 1-5
-
-
Madiseh, M.G.1
He, S.2
McGuire, M.L.3
Neville, S.W.4
Dong, X.5
-
38
-
-
0036906341
-
Characterization of ultra-wide bandwidth wireless indoor communications channel: A communication-theoretic view
-
Dec
-
M. Z. Win and R. A. Scholtz, "Characterization of ultra-wide bandwidth wireless indoor communications channel: A communication-theoretic view," IEEE J. Sel. Areas Commun., vol. 20, no. 9, pp. 1613-1627, Dec. 2002.
-
(2002)
IEEE J. Sel. Areas Commun.
, vol.20
, Issue.9
, pp. 1613-1627
-
-
Win, M.Z.1
Scholtz, R.A.2
-
39
-
-
29044434567
-
Ultrawideband propagation channels-theory, measurement, and modeling
-
DOI 10.1109/TVT.2005.856194
-
A. F. Molisch, "Ultrawideband propagation channels-theory, measurement, and modeling," IEEE Trans. Veh. Technol., vol. 54, no. 5, pp. 1528-1545, Sep. 2005. (Pubitemid 41787119)
-
(2005)
IEEE Transactions on Vehicular Technology
, vol.54
, Issue.5
, pp. 1528-1545
-
-
Molisch, A.F.1
-
40
-
-
84862848013
-
A comprehensive standardized model for ultrawideband propagation channels
-
Nov
-
A. F. Molisch, D. Cassioli, C.-C. Chong, S. Emami, A. Fort, B. Kannan, J. Karedal, J. Kunisch, H. Schantz, K. Siwiak, and M. Z. Win, "A comprehensive standardized model for ultrawideband propagation channels," IEEE Trans. Antennas Propag., vol. 54, no. 11, pp. 3151-3166, Nov. 2006.
-
(2006)
IEEE Trans. Antennas Propag.
, vol.54
, Issue.11
, pp. 3151-3166
-
-
Molisch, A.F.1
Cassioli, D.2
Chong, C.-C.3
Emami, S.4
Fort, A.5
Kannan, B.6
Karedal, J.7
Kunisch, J.8
Schantz, H.9
Siwiak, K.10
Win, M.Z.11
-
41
-
-
0036686437
-
The ultra-wide bandwidth indoor channel: From statistical model to simulations
-
DOI 10.1109/JSAC.2002.801228, PII 1011092002801228, Channel and Propagation Models for Wireless System Design II
-
D. Cassioli, M. Z. Win, and A. F. Molisch, "The ultra-wide bandwidth indoor channel: From statistical model to simulations," IEEE J. Sel. Areas Commun., vol. 20, no. 6, pp. 1247-1257, Aug. 2002. (Pubitemid 34950013)
-
(2002)
IEEE Journal on Selected Areas in Communications
, vol.20
, Issue.6
, pp. 1247-1257
-
-
Cassioli, D.1
Win, M.Z.2
Molisch, A.F.3
-
42
-
-
62949180288
-
Ultra-wide-band propagation channels
-
Feb
-
A. F. Molisch, "Ultra-wide-band propagation channels," Proc. IEEE, vol. 97, no. 2, pp. 353-371, Feb. 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.2
, pp. 353-371
-
-
Molisch, A.F.1
-
45
-
-
0032184399
-
Quantization
-
Oct
-
R. M. Gray and D. L. Neuhoff, "Quantization," IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2325-2383, Oct. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.6
, pp. 2325-2383
-
-
Gray, R.M.1
Neuhoff, D.L.2
-
46
-
-
77956060110
-
Fundamental limits of wideband localization- Part I: A general framework
-
Oct
-
Y. Shen and M. Z. Win, "Fundamental limits of wideband localization- Part I: A general framework," IEEE Trans. Inf. Theory, vol. 56, no. 10, pp. 4956-4980, Oct. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.10
, pp. 4956-4980
-
-
Shen, Y.1
Win, M.Z.2
-
47
-
-
77956062602
-
Fundamental limits of wideband localization- Part II: Cooperative networks
-
Oct
-
Y. Shen, H. Wymeersch, and M. Z. Win, "Fundamental limits of wideband localization- Part II: Cooperative networks," IEEE Trans. Inf. Theory, vol. 56, no. 10, pp. 4981-5000, Oct. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.10
, pp. 4981-5000
-
-
Shen, Y.1
Wymeersch, H.2
Win, M.Z.3
|